this post was submitted on 10 Mar 2025
54 points (98.2% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

58590 readers
527 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):

🏴‍☠️ Other communities

Torrenting:

Gaming:


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 2 years ago
MODERATORS
 

In December 2024, Microsoft Threat Intelligence identified a malware campaign stemming from pirate streaming sites. Using iframe malvertising redirector URLs to generate revenue, and redirects up to five layers deep, malware payloads hosted on GitHub, Discord and Dropbox, acted as a dropper for additional payloads hosted elsewhere. Microsoft says the goal was to steal information and it believes almost a million devices were infected.

you are viewing a single comment's thread
view the rest of the comments
[–] turkalino@lemmy.yachts 4 points 16 hours ago

Something I'm not understanding is how these payloads even get executed. In "First Stage" in Figure 3, it explains that the user is redirected to a Github repo and then the payload is downloaded, but how exactly does it go to the second stage from there? I would assume the user has to be dumb enough to double-click on the payload that got downloaded, but the article makes it sound like this all happens automatically after clicking the initial ad link