{"id":67742,"date":"2025-01-14T11:50:29","date_gmt":"2025-01-14T17:50:29","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=67742"},"modified":"2025-01-14T11:51:02","modified_gmt":"2025-01-14T17:51:02","slug":"cybercriminals-use-youtube-comments-and-google-results-to-spread-malware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/","title":{"rendered":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware"},"content":{"rendered":"\n<p>Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel tactic targeting users looking for pirated or cracked software. By utilizing reputable platforms such as YouTube and Google, they distribute malware to steal personal data.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">How the Attack Works<\/h1>\n\n\n\n<p>Hackers are taking advantage of YouTube and Google search results to spread their malware:<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">YouTube Videos:<\/h6>\n\n\n\n<p>Hackers create fake tutorial videos that claim to show how to install pirated software. These videos include links in the description or comments that lead to malicious downloads.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Google Search Results:<\/h6>\n\n\n\n<p>Cybercriminals manipulate Google search results to display fake download links. These links appear legitimate but instead install malware on the victim&#8217;s device.<\/p>\n\n\n\n<p>To make their attacks more convincing, hackers host these harmful files on trusted platforms like Mediafire and Mega.nz, making it harder to detect the threat.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Tricks to Avoid Detection<\/h1>\n\n\n\n<p>Hackers use advanced methods to avoid getting caught:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Password-Protected Files:<\/strong> They use passwords on files to prevent security systems from scanning them.<\/li>\n\n\n\n<li><strong>Encoding and Obfuscation:<\/strong> These techniques hide the malware, making it harder for antivirus programs to find.<\/li>\n\n\n\n<li><strong>Data Theft:<\/strong> Once installed, the malware steals sensitive information like passwords and cryptocurrency wallet details.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Types of Malware Used<\/h1>\n\n\n\n<p>Several types of malware are being spread in this campaign, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lumma Stealer:<\/strong> Steals passwords and other private data.<\/li>\n\n\n\n<li><strong>Vidar and MarsStealer:<\/strong> Targets cryptocurrency wallets.<\/li>\n\n\n\n<li><strong>PrivateLoader and Amadey:<\/strong> Collect personal information and login credentials.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Exploiting Trusted Platforms<\/h1>\n\n\n\n<p>Hackers rely on the trust people place in platforms like YouTube and Google. Some examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A fake YouTube video claiming to offer a free &#8220;Adobe Lightroom Crack,&#8221; with links leading to malware.<\/li>\n\n\n\n<li>Malicious links in Google search results for Autodesk software, redirect users to harmful downloads.<\/li>\n<\/ul>\n\n\n\n<p>They often use shortened URLs and password-protected files to make their attacks harder to detect.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Staying Safe from Malware<\/h1>\n\n\n\n<p>Here are some tips to protect yourself and your organization:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Stay Informed:<\/strong> Learn about the latest threats and how they work.<\/li>\n\n\n\n<li><strong>Educate Employees:<\/strong> Train staff to avoid downloading pirated software and recognize suspicious links.<\/li>\n\n\n\n<li><strong>Use Security Tools:<\/strong> Install strong antivirus software and firewalls to detect and block threats.<\/li>\n\n\n\n<li><strong>Check Sources:<\/strong> Only download software from official, trusted websites.<\/li>\n\n\n\n<li><strong>Layer Your Security:<\/strong> Combine multiple tools and methods for better protection.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>Infostealing malware is a growing threat, and cyber criminals use trusted platforms to spread it. You can protect yourself and your data from these attacks by staying alert and following best practices.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>Source:<\/strong> Montalbano, Elizabeth. &#8220;Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results.&#8221; <em>Contributing Writer<\/em>, January 13, 2025.<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel tactic targeting users looking for pirated or cracked software. By utilizing reputable platforms such as YouTube and Google, they distribute malware to steal personal data. How the Attack Works Hackers are taking advantage of YouTube and [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":67744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6223],"tags":[],"class_list":["post-67742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scam-alert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybercriminals Use YouTube Comments and Google Results to Spread Malware<\/title>\n<meta name=\"description\" content=\"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Use YouTube Comments and Google Results to Spread Malware\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-14T17:50:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-14T17:51:02+00:00\" \/>\n<meta name=\"author\" content=\"Jessica Molden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jessica Molden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/\"},\"author\":{\"name\":\"Jessica Molden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\"},\"headline\":\"Cybercriminals Use YouTube Comments and Google Results to Spread Malware\",\"datePublished\":\"2025-01-14T17:50:29+00:00\",\"dateModified\":\"2025-01-14T17:51:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/\"},\"wordCount\":434,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/file-20240207-26-evrzf4.avif\",\"articleSection\":[\"Scam Alert\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/\",\"name\":\"Cybercriminals Use YouTube Comments and Google Results to Spread Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/file-20240207-26-evrzf4.avif\",\"datePublished\":\"2025-01-14T17:50:29+00:00\",\"dateModified\":\"2025-01-14T17:51:02+00:00\",\"description\":\"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/file-20240207-26-evrzf4.avif\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/file-20240207-26-evrzf4.avif\",\"width\":640,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercriminals Use YouTube Comments and Google Results to Spread Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/66010e2a7c093df51d1ce9344e904700\",\"name\":\"Jessica Molden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/jmolden\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware","description":"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/","og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware","og_description":"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel","og_url":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2025-01-14T17:50:29+00:00","article_modified_time":"2025-01-14T17:51:02+00:00","author":"Jessica Molden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Jessica Molden","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/"},"author":{"name":"Jessica Molden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700"},"headline":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware","datePublished":"2025-01-14T17:50:29+00:00","dateModified":"2025-01-14T17:51:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/"},"wordCount":434,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-20240207-26-evrzf4.avif","articleSection":["Scam Alert"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/","url":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/","name":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-20240207-26-evrzf4.avif","datePublished":"2025-01-14T17:50:29+00:00","dateModified":"2025-01-14T17:51:02+00:00","description":"Cybercriminals are increasingly clever in deceiving individuals into downloading malicious software. Recent research by Trend Micro highlights a novel","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-20240207-26-evrzf4.avif","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/file-20240207-26-evrzf4.avif","width":640,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/cybercriminals-use-youtube-comments-and-google-results-to-spread-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybercriminals Use YouTube Comments and Google Results to Spread Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/66010e2a7c093df51d1ce9344e904700","name":"Jessica Molden","url":"https:\/\/www.pcmatic.com\/blog\/author\/jmolden\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=67742"}],"version-history":[{"count":1,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67742\/revisions"}],"predecessor-version":[{"id":67743,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/67742\/revisions\/67743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/67744"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=67742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=67742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=67742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}