Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

Proxyware Campaign Piggybacks on Popular YouTube Video Download Services

The AhnLab Security Intelligence Center (ASEC) has uncovered fresh instances of proxyware distribution by threat actors leveraging deceptive advertising on freeware sites.

Building on prior reports, such as the “DigitalPulse Proxyware Being Distributed Through Ad Pages” analysis, this campaign continues to exploit unwitting users in South Korea, installing unauthorized bandwidth-sharing tools like DigitalPulse and Honeygain.

These attacks exemplify proxyjacking, where malicious actors surreptitiously deploy proxyware to monetize victims’ internet resources without consent, mirroring the resource exploitation seen in cryptojacking but focusing on network bandwidth rather than computational power for cryptocurrency mining.

Proxyjacking involves the illicit installation of proxyware, software designed to allocate a portion of a system’s bandwidth to external entities in exchange for compensation.

When deployed non-consensually, it results in bandwidth theft, with profits funneled to attackers.

Historical precedents include a 2023 campaign documented by LevelBlue, which compromised over 400,000 Windows systems via DigitalPulse.

ASEC’s monitoring reveals sustained activity in Korea, with recent infections employing similar tactics but incorporating variants like Honeygain’s proxyware.

YouTube Video Download Pages

Threat actors are masquerading malware as legitimate YouTube video downloaders, capitalizing on users searching for free tools via search engines.

Victims entering a video URL encounter seemingly benign sites offering a “Download Now” button, which redirects to ad-laden pages or direct malware downloads.

YouTube video download page

Utilizing GitHub repositories as a distribution vector, attackers upload executables that initiate the infection chain.

The malware, often disguised as “QuickScreenRecorder.exe,” executes a PowerShell script that performs anti-analysis checks for sandboxes and virtual machines before proceeding to install proxyware.

The infection flowchart remains consistent with prior incidents: after evasion routines, the script installs NodeJS, fetches malicious JavaScript, and schedules tasks under names like “DefragDiskCleanup.”

This JavaScript communicates with command-and-control (C&C) servers, relaying system telemetry and receiving PowerShell commands to deploy the proxyware.

In most cases, DigitalPulse is installed, but variants introduce Honeygain’s “hgsdk.dll” alongside a launcher “FastCleanPlus.exe,” registered in the task scheduler.

The launcher invokes the DLL’s hgsdk_start() function using the attacker’s API key, enabling bandwidth sharing.

Malware Analysis

Detailed dissection shows the malware’s modular design, with PowerShell scripts handling downloads and executions.

Proxyware Campaign
Flowchart of malware installation

Responses from C&C servers often include commands to fetch compressed archives containing Honeygain components.

Detection signatures from ASEC include Dropper/Win.Proxyware.C5783593 and behavioral indicators like Execution/MDP.Powershell.M2514, emphasizing the need for robust endpoint protection.

This campaign underscores the risks of downloading from unofficial sources rife with ads and pop-ups. Users should verify site authenticity and employ security solutions like V3 to scan for infections.

As proxyjacking evolves, blending with established malware families, proactive monitoring of indicators of compromise (IoCs) is crucial to thwart these resource-exploiting threats.

Indicators of Compromise (IoCs)

Type Indicator Description
MD5 01a2eb2c3d07121a6acee9336f6716ec Malware hash
MD5 0310c2987666e5468cca3909042cf666 Malware hash
MD5 1aea1442bbbec8cee28d5fdc0961c130 Malware hash
MD5 1c6fa070cfec5dbf9a4aa55732e145d6 Malware hash
MD5 1e2b800cda9a133f51ad40ea5a836d29 Malware hash
URL https://d17b7mkheg0tx6.cloudfront.net/FirmwareUpdate.exe Download URL
URL https://d17b7mkheg0tx6.cloudfront.net/KB8241660.ps1 PowerShell script URL
URL https://d1kxwjqxc4unl0.cloudfront.net/KB3457229.ps1 PowerShell script URL
URL https://d1kxwjqxc4unl0.cloudfront.net/NetworkSpeedStatus.exe Executable URL
URL https://d24c5955rpu08d.cloudfront.net/FastCleanPlus.zi Compressed file URL
Detection Dropper/Win.Proxyware.C5783593 (2025.07.30.02) File detection signature
Detection Unwanted/Win.Proxyware.R712792 (2025.07.14.00) File detection signature
Detection Execution/MDP.Powershell.M2514 Behavioral diagnosis

AWS Security Services: 10-Point Executive Checklist - Download for Free


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.