Over the past year, Bitdefender researchers have been monitoring a persistent malicious campaign that initially spread via Facebook Ads, promising “free access” to TradingView Premium and other trading or financial platforms.
According to researchers at Bitdefender Labs, this campaign has now expanded beyond Meta platforms, infiltrating both YouTube and Google Ads, exposing content creators and regular users alike to increased risks.
Unlike legitimate ads, these malicious campaigns redirect users to malware-laced downloads aiming to steal credentials and compromise accounts.
You can read more about these global malvertising campaigns here:
Looking into the specifics of the scam impersonating TradingView, researchers found that threat actors hijacked the Google advertiser account of a design agency in Norway. Separately, the cybercrooks also took over a YouTube account to which they could begin redirecting victims through Google’s ads system. Once again, the verified status of the compromised YouTube channel, combined with its new branding and TradingView visuals, allowed cybercriminals to impersonate the official TradingView channel. The rebranded channel was designed to be nearly indistinguishable from TradingView’s by:
You may also want to read: Malicious Facebook Ads Push Fake ‘Meta Verified’ Browser Extensions to Steal Accounts
Upon closer inspection, several red flags emerge:
One ad video is titled “Free TradingView Premium – Secret Method They Don’t Want You to Know”. Despite being unlisted, it gained over 182,000 views in just a few days through aggressive advertising.
The video’s generic promotional content mentions the capabilities of the TradingView application. The description of the unlisted video includes a link where the user can download the malicious executable. Just as in the Meta ads, the user might end up on a benign page if the attackers don’t think the requests were made from a valid target.
Why unlisted videos? The unlisted status is deliberate, of course. By not being publicly searchable, these malicious videos avoid casual reporting and platform moderation. Instead, they are shown exclusively through ad placements, ensuring they reach their targets while remaining hidden from public view.
The description promises benefits such as simplified trading, personalized indicators, and “reasonable” trading strategies. To build trust, it even includes disclaimers about financial risks. However, these messages mask the real intent:
This case highlights a growing risk: when a company’s Google account is compromised, its connected YouTube channel can be stripped of all original content and repurposed for scam and other malicious activities.
Here’s how compromise can occur:
Upon analyzing the malware, Bitdefender researchers identified that, while it shares traits with past samples (such as those detected as Generic.MSIL.WMITask), the initial downloader was custom-built to resist detection and analysis.
While the old samples were communicating with the “front-end” via plain HTTP requests on various ports (30303, 30308) and routes (/s, /set, /q, /query), the new sample communicates using websockets, on the port 30000 and the /config route.
The cybercrooks changed the Front-End scripts so they are not as easy to investigate. The code is first obfuscated and encrypted with AES-CBC.
Then, the decrypted service worker code is also obfuscated. Upon deobfuscation, it can be seen that it uses https://jimmywarting.github.io/StreamSaver.js to deliver the malicious file (when the user downloads it). This can be done to avoid detection and to make manual analysis more difficult. We can also see the configuration for communicating with the malicious executable:
As seen in the previous samples, the sample uses PostHog for user tracking, while also using Facebook Pixel tracking, Google Ads Conversion Tracking, Microsoft Ads Pixel and Adprofex postback. These tracking efforts, obviously without user consent, offer a clear idea of how these threat actors might end up targeting users on multiple platforms, while also allowing them to block certain requests or display benign content to users not considered valid targets.
The installer.exe malware (another difference is the type of executable - the old sample was a .msi file) proceeds to create a Scheduled Task called EdgeResourcesInstallerV12-issg with the payload it received through websockets.
Through these scheduled tasks, the malware adds Windows Defender exclusions and downloads and executes the next stage using the Invoke-Expression powershell cmdlet. The whole malicious process can be seen below in a simplified form.
Bitdefender detects the initial loader as Variant.DenoSnoop.Marte.1, the intermediate powershells with various detections and the final payload as Trojan.Agent.GOSL. The malware (final payload), named JSCEAL by Checkpoint and WeevilProxy by WithSecure, is a sophisticated stealer with both espionage and remote access capabilities.
Capabilities include:
Bitdefender’s prolonged analysis of this malicious advertising campaign found:
An up-to-date, complete list of indicators of compromise is available to Bitdefender Advanced Threat Intelligence users here.
If you encounter ads promising free access to premium trading tools or software:
Creators and organizations with a YouTube presence are also targets of these campaigns. Hijacked accounts not only damage reputations but also put followers at risk. Here’s a quick checklist of what you can do now to stay safe:
tags
I’m a software engineer with a strong focus on cybersecurity, on a mission to make the digital world safer and more resilient. I love building solutions that protect people and organizations globally.
View all postsI'm a software engineer with a passion for cybersecurity & digital privacy.
View all posts