Slovakian software security firm Eset has uncovered that cyber criminals behind the Stantinko botnet have been distributing a Monero (XMR) cryptocurrency mining module via Youtube.

On Nov. 26, the major antivirus software supplier Eset reported that the Stantinko botnet operators accept expanded their criminal reach from click fraud, advertising injection, social network fraud and password stealing attacks, into installing crypto malware on victims' devices using Youtube.

Stantinko botnet has been agile since at least 2022

The Stantinko botnet, which has been agile since at to the lowest degree 2022 and predominantly targets users in Russia, Ukraine, Belarus and Kazakhstan, reportedly uses YouTube channels to distribute its cryptojacking module, which mines the privacy-focused crypto coin Monero on the CPUs of unsuspecting victims.

This cryptocurrency-stealing malware has reportedly infected around 500,000 devices, and is similar to the recently discovered malicious malware, Dexphot, malware discovered by Microsoft that has already infected more than eighty,000 computers.

These crypto-hijacking codes steal processing resources, have over legitimate system processes and disguise the nefarious activity with the ultimate goal of running a crypto miner on the infected devices.

Eset informed YouTube, which reportedly responded by removing all the channels that independent traces of Stantinko'southward code.

Malware on Monero's official website was stealing crypto

In November, Monero's core evolution squad said that the software available for download on Monero's official website might have been compromised to steal cryptocurrency. A professional investigator going by the name of Serhack confirmed that the software distributed after the server was compromised was indeed malicious:

"I tin can ostend that the malicious binary is stealing coins. Roughly 9 hours later I ran the binary a unmarried transaction tuckered the wallet. I downloaded the build yesterday around 6pm Pacific time."