Netcrook Logo
👤 LOGICFALCON
🗓️ 20 Dec 2025  

Malware Masquerade: How Cracked Software and YouTube Lures Are Infecting Users Worldwide

Cybercriminals are exploiting cracked software downloads and YouTube videos to stealthily deploy CountLoader and GachiLoader malware, unleashing waves of data theft and evasion tactics.

Imagine downloading what seems like a free copy of Microsoft Word or clicking on a YouTube tutorial - only to unwittingly open the door to sophisticated cyber threats. A new wave of malware campaigns is capitalizing on the public’s appetite for free software and instructional videos, infecting thousands of computers with stealthy loaders designed for espionage, data theft, and more. The latest culprits: CountLoader and GachiLoader, two modular tools at the heart of an escalating cybercrime trend.

The CountLoader campaign begins innocuously enough: a user searching for cracked software is redirected to download a password-protected ZIP file, which contains what looks like a legitimate "Setup.exe." In reality, this is a hijacked Python interpreter programmed to fetch CountLoader 3.2 from a remote server, using a trusted Windows tool, mshta.exe, to avoid suspicion. Once inside, CountLoader establishes persistence by creating a scheduled task disguised as a Google update, set to run every 30 minutes for a decade.

CountLoader demonstrates a remarkable ability to adapt. It checks for security tools like CrowdStrike Falcon and tweaks its behavior to slip past defenses. Its arsenal includes downloading and executing various malware types, exfiltrating system information, spreading via USB drives, and leveraging fileless execution with PowerShell or mshta.exe. In recent campaigns, the endgame has been the deployment of ACR Stealer, a data-harvesting tool capable of siphoning off sensitive information.

Meanwhile, GachiLoader is taking a different route - straight through YouTube. By compromising nearly 40 YouTube accounts, attackers have uploaded over 100 videos that collectively reached hundreds of thousands. Viewers drawn in by fake software installers unwittingly download GachiLoader, a Node.js-based loader that uses heavily obfuscated JavaScript to avoid analysis. One of its most notable tricks is a novel code injection technique: it loads a legitimate DLL, then covertly swaps it out with malicious code using Vectored Exception Handling, a move that baffles many traditional security tools.

GachiLoader is also engineered for stealth. It checks if it has administrative privileges and, if not, prompts the victim for elevation - often successfully. It aggressively disables Microsoft Defender protections and sets up exclusions to shield its subsequent activities, before fetching further payloads like the notorious Rhadamanthys information stealer. The sophistication of both loaders underscores a disturbing trend: cybercriminals are blending social engineering with advanced technical know-how, making attacks more effective and harder to detect than ever.

For users enticed by "free" software or seemingly helpful YouTube videos, the risks are mounting. As these loaders evolve, so too must our defenses - raising the stakes for individuals, businesses, and security professionals alike. The line between convenience and compromise has never been thinner.

WIKICROOK

  • Loader: A loader is malicious software that installs or runs other malware on an infected system, enabling further cyberattacks or unauthorized access.
  • Fileless Execution: Fileless execution is a cyberattack method where malware operates in memory using trusted system tools, making detection by traditional antivirus tools difficult.
  • Vectored Exception Handling: Vectored Exception Handling is a Windows feature for managing program errors, offering flexible control but sometimes exploited by malware for code injection.
  • Persistence: Persistence involves techniques used by malware to survive reboots and stay hidden on systems, often by mimicking legitimate processes or updates.
  • Exfiltration: Exfiltration is the unauthorized transfer of sensitive data from a victim’s network to an external system controlled by attackers.
Malware Cybercrime YouTube

LOGICFALCON LOGICFALCON
Log Intelligence Investigator
← Back to news