HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Phishing Campaign Uses Fake YouTube Copyright Notices to Hijack Google Accounts

A sophisticated phishing operation lures YouTube creators with a counterfeit copyright‑strike page that pulls real channel data, stealing Google credentials and granting attackers control of Gmail, Drive, payments, and the channel itself. The threat poses significant third‑party risk for brands that partner with creators.

LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 malwarebytes.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

Phishing Campaign Uses Fake YouTube Copyright Notices to Hijack Google Accounts

What Happened — A new phishing operation targets YouTube creators with a counterfeit copyright‑strike page that pulls live channel data to make the lure appear authentic. Victims who enter their Google credentials hand over full control of their Google account, including Gmail, Drive, payments, and the YouTube channel itself.

Why It Matters for TPRM

  • Credential compromise of a single Google login can expose an entire suite of SaaS services used by a vendor or partner.
  • Hijacked channels are quickly repurposed for scams, creating reputational risk for any brand that collaborates with the creator.
  • The campaign operates as a “franchise,” meaning multiple attackers can leverage the same infrastructure against many third‑party vendors.

Who Is Affected — Media & entertainment companies, digital marketing agencies, influencer‑management firms, and any organization that relies on YouTube creators for brand promotion.

Recommended Actions

  • Verify that all creator accounts use hardware‑based 2FA and enforce security keys where possible.
  • Conduct a phishing‑simulation exercise focused on “copyright strike” lures.
  • Review contracts with creator‑related vendors for clauses requiring MFA and rapid incident response.

Technical Notes — Attack vector: credential‑stealing phishing page hosted at dmca-notification.info that dynamically injects the victim’s channel avatar, subscriber count, and latest video metadata. No known CVE; the threat relies on social engineering and real‑time data scraping. Data at risk includes Gmail, Google Drive files, Google Pay details, and the YouTube channel itself. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/threat-intel/2026/04/fake-youtube-copyright-notices-can-steal-your-google-login

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.