{"id":26,"date":"2009-12-14T10:37:00","date_gmt":"2009-12-14T10:37:00","guid":{"rendered":"http:\/\/www.roysac.com\/blog\/wp-admin\/2009\/12\/malware-threat-warning-scam-via-online-video\/"},"modified":"2014-07-17T13:36:21","modified_gmt":"2014-07-17T21:36:21","slug":"malware-threat-warning-scam-via-online-video","status":"publish","type":"post","link":"https:\/\/www.roysac.com\/blog\/2009\/12\/malware-threat-warning-scam-via-online-video\/","title":{"rendered":"Malware Threat Warning! Scam via Online Video!"},"content":{"rendered":"<p><strong>This is not a prank!<\/strong> I Just stumbled across this when videos by the <em><strong>YouTube<\/strong><\/em> user?? <a href=\"http:\/\/www.youtube.com\/user\/Kaleigh421112Trang\" target=\"_blank\">Kaleigh421112Trang<\/a> suddenly showed up in my subscriptions (based on Keywords) for my <a href=\"http:\/\/www.youtube.com\/CirqueDuSoleilGuru\" target=\"_blank\">CirqueDuSoleilGuru<\/a> account.<\/p>\n<p><em>I made the URLs that are not hyperlinked this way on purpose, to prevent any accidental harm to the readers. You can copy and paste the URLs into your browsers address bar, if you know what you are doing at your own risk. Don???t say that I did not warn you!<\/em><\/p>\n<p>The user account in question was just created <strong>on 12\/13\/2009<\/strong><\/p>\n<p>By now this user has already <strong><em>190<\/em><\/strong> virtually identical videos uploaded that don&#8217;t show much, except a message that the video cannot be watched on YouTube due to length limitation. See description for link to full video. etc. Here is a screen shot of it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"YouTubeScam01\" src=\"http:\/\/www.roysac.com\/blogimages\/YouTubeScam01.png\" alt=\"YouTubeScam01\" width=\"524\" height=\"400\" border=\"0\" \/><\/p>\n<p>E.g. Circus Circus Part 1\/13 Online*:?? <em><strong>http:\/\/www.youtube.com\/watch?v=l5kYgqUX0rE<\/strong><\/em><\/p>\n<p>*This video was actually already taken down by YouTube, maybe because I flagged it as Spam from an established YouTube account with almost 2000 subscribers. But most of the other videos are still up as I am writing this. For example this one <em><strong>http:\/\/www.youtube.com\/watch?v=hJj-PkdLqac<\/strong><\/em>?? (which I also reported so it is probably being removed shortly as well)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"YouTubeScam05\" src=\"http:\/\/www.roysac.com\/blogimages\/YouTubeScam05.png\" alt=\"YouTubeScam05\" width=\"700\" height=\"83\" border=\"0\" \/><\/p>\n<p>The videos that are still up all include a short description and a obscured link with tracking code embed via the redirection service <strong><em>TinyURL.com<\/em><\/strong>. In the example video that I mentioned before and reported to YouTube already the URL was: <em><strong>http:\/\/tinyurl.com\/ycksuwy&amp;499420166 <\/strong><\/em><\/p>\n<h3>Here Comes The Scammy Part<\/h3>\n<p>That URL redirects to:<em><strong> http:\/\/www.onlinemoviedb.info\/watch.php?vid=Dreaming_in_Circus <\/strong><\/em><\/p>\n<p>The page states that a plug-in must be downloaded to watch the video. It includes multiple links where you are supposed to download the needed plug-in from, such as this one <strong>(Warning! Do not Download and Execute)!<\/strong><\/p>\n<p><em><strong>http:\/\/preview.licenseacquisition.org\/48\/1056428137.51143\/vlc-1.0.1-win32.exe<\/strong><\/em><\/p>\n<p>The referred to EXE ???<strong>vlcsetup.exe<\/strong>??? is 328,984 bytes in size. The file name is implying that the plug-in is related to the freeware <a href=\"http:\/\/www.videolan.org\/\" target=\"_blank\">VideoLan Video Player<\/a>, what it is not.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"YouTubeScam02\" src=\"http:\/\/www.roysac.com\/blogimages\/YouTubeScam02.png\" alt=\"YouTubeScam02\" width=\"707\" height=\"733\" border=\"0\" \/><\/p>\n<p>I downloaded the executable without starting it. I then scanned it with McAfee Viruscan, which did not detect anything yet. So I uploaded it to <a href=\"http:\/\/www.virustotal.com\/\" target=\"_blank\">VirusTotal.com<\/a>, an online on-demand virus and malware scanner, which scans files using over 50 different scanners such as McAfee, F-Secure, Bitdefender, Kaspersky, Panda, PC-Tools, Sophos, TrendMicro and others.<\/p>\n<p>I wasn???t the first one who checked the file obviously, because a report was already available*, which gives it a 37% probability that it is infected. It is probably new and I bet the probability will increase as I write this (as do the uploads of virtually identical videos with the same purpose to YouTube).<\/p>\n<p>Here is the link to <a href=\"http:\/\/www.virustotal.com\/analisis\/6e62e219e38c90562a59851b72f2929000b599a6ddd0f2482c7b1acda0a8ce9d-1260740892\" target=\"_blank\">the report from VirusTotal.com<\/a>.<\/p>\n<table cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td>* VirusTotal.com knows that it is the same file as somebody else already submit based on the file size and file name, because that could be faked easily. It uses so called checksums that are generated from the entire content of the file. The Checksums for this file are for example:<\/p>\n<p>MD5???? : bead2d46d08ff080ac4a6d0908922230<br \/> SHA1?? : 0697fe4257419efc39921c9da71c8339cde3f463<br \/> SHA256: 6e62e219e38c90562a59851b72f2929000b599a6ddd0f2482c7b1acda0a8ce9d<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>More Hints and Scale of the Problem<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"YouTubeScam04\" src=\"http:\/\/www.roysac.com\/blogimages\/YouTubeScam04.png\" alt=\"YouTubeScam04\" width=\"340\" height=\"346\" align=\"right\" border=\"0\" \/>Here are more accounts on YouTube. Just to name a few (Each with hundreds of videos each):<\/p>\n<p><a href=\"http:\/\/www.youtube.com\/user\/Moon230377Arletta\">http:\/\/www.youtube.com\/user\/Moon230377Arletta<\/a><br \/> <a href=\"http:\/\/www.youtube.com\/user\/Dirk891479Pasty\">http:\/\/www.youtube.com\/user\/Dirk891479Pasty<\/a><br \/> <a href=\"http:\/\/www.youtube.com\/user\/Kathy664276Dominica\">http:\/\/www.youtube.com\/user\/Kathy664276Dominica<\/a><\/p>\n<p>There are most certainly a lot more, but they should be easily be detected. Look for new users that have hundred+ videos of 9:58 minutes length and a TinyURL.com link in the video description.<\/p>\n<p>All of those Users always have video listing disabled (does not show anything on the user???s home page)<\/p>\n<p>The target website itself lists tons of copyrighted movies on its homepage.<\/p>\n<p>Also suspicious, the detail page of every movie has the same comments to give the impression that people watched the movie etc.<\/p>\n<p>Here are the fake comments<\/p>\n<blockquote>\n<p>Looploop<br \/> 3rd link worked perfectly and fast mirror. I liked it. Thanks for the upload!<\/p>\n<p>Hotjamz<br \/> Yep that was a good one 5\/5<\/p>\n<p>Monstersb<br \/> didn&#8217;t think it was all that,but it was good.7\/10.great qualit tho<\/p>\n<p>DazedNConfused<br \/> How do I watch this video?<\/p>\n<p>DazedNConfused<br \/> Never mind. I just downloaded the plugin and the video worked flawlessly!<\/p>\n<\/blockquote>\n<h3>This Is Just The Beginning<\/h3>\n<p>The uploads are done on a large scale and with sophisticated scripts to dynamically create typical titles with matching descriptions in YouTube. YouTube also has a dupe checker that identical videos cannot be uploaded by the same account (at least used to be it that way). But changing a single byte is already enough to get around it. That???s probably all these guys did, because the videos appear to the human viewer identical. They also show all the same Thumbnail, which should raise suspicion by any user of YouTube with some working brain cells left (That is how I got suspicious). The hackers are obviously not sophisticated enough though, because they did not seem to have taken into account the problem with identical thumbnails that will appear in the box with ???more videos by ?????? but also in the ???related video box??? where I got the other user names from. Because the videos are similar in some fashion, YouTube thinks that they are related.<\/p>\n<p>It is very very hard to produce identical thumbnails for videos that are not identical. In the early days YouTube used frames that could be predicted in advance (and was used for manipulations by users). This isn???t possible today anymore.<\/p>\n<p>I would not be surprised, if similar scams will pop-up in the future more and more, also on other smaller social networks and video sharing sites. Those scams will also get more and more sophisticated and users will be vulnerable until their Antivirus\/Antispyware software will be updated to detect those new threats that will emerge and then disappear again quickly.<\/p>\n<h3>The only real protection is up to the user himself<\/h3>\n<p>NEVER download and install a plug-in where you don???t know and trust the source. Installing a malicious plug-in is like unlocking the door, disabling the alarm and then open it to invite the burglar in to have a look around and take whatever he likes.?? Almost all video sharing sites use FLASH for the video playback. The Flash plug-in should only be downloaded from the Adobe.com web site (and not from anywhere else).<\/p>\n<p><a href=\"http:\/\/www.adobe.com\/go\/getflashplayer\">http:\/\/www.adobe.com\/go\/getflashplayer<\/a><\/p>\n<p>Some apps might use the Shockwave plug-in, also from Adobe, which can be downloaded and installed via<\/p>\n<p><a href=\"http:\/\/www.adobe.com\/go\/getshockwave\">http:\/\/www.adobe.com\/go\/getshockwave<\/a><\/p>\n<p>Although I have not seen used with online video yet, web applications might also use JAVA by SUN, which can also be downloaded absolutely free of charge (like the FLASH and SHOCKWAVE plug-ins) from the web site that was created by SUN just for this. The URL is: <a title=\"http:\/\/www.java.com\/download\" href=\"http:\/\/www.java.com\/download\">http:\/\/www.java.com\/download<\/a><\/p>\n<p>Be Careful, without getting paranoid. Use common sense and caution where appropriate. Unfortunately not everybody on the Internet has the safety and happiness of the users in mind.<\/p>\n<p>Be Safe!<\/p>\n<p>Cheers!<\/p>\n<p>Carsten aka Roy\/SAC<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is not a prank! I Just stumbled across this when videos by the YouTube user?? Kaleigh421112Trang suddenly showed up in my subscriptions (based on Keywords) for my CirqueDuSoleilGuru account. I made the URLs that are not hyperlinked this way on purpose, to prevent any accidental harm to the readers. You can copy and paste [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,6,15],"tags":[],"class_list":["post-26","post","type-post","status-publish","format-standard","hentry","category-personal","category-politics","category-video"],"_links":{"self":[{"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":3,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":894,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/posts\/26\/revisions\/894"}],"wp:attachment":[{"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.roysac.com\/blog\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}