Minecraft cheat tools may actually contain malware • The Register | #cybercrime | #infosec


Trojanized Minecraft cheat tools hosted on GitHub have secretly installed stealers that siphon credentials, crypto wallets, and other sensitive data when executed by players.

According to Check Point Research, which spotted the Minecraft mod malware, about 500 GitHub repositories were part of this operation targeting gamers and about 70 accounts gave the malicious repos 700 stars. Upwards of 1,500 devices may have been infected to date.

Considering the video game’s popularity — Minecraft has more than 200 million monthly active players — the potential for data theft is huge.

This campaign has been active since March, and the researchers attribute it to Russian-speaking malware developers operating as part of the so-called Stargazers Ghost Network — a network of GitHub accounts that distribute malware and malicious links through malicious repositories.

The malware purports to be popular cheat tools like Oringo and Taunahi, and once executed, kicks off a multi-stage attack with the first two written in Java and requiring Minecraft to be pre-installed on the victim’s device.

The first-stage malware loader, a malicious JAR mod, runs at game launch and uses anti-VM and anti-analysis checks to spot and abort in sandbox environments, ensuring it only proceeds on a real victim’s machine.

Assuming the loader passes these and other environment checks, it then loads the second stage: stealer malware that swipes users’ Minecraft tokens and Microsoft account info, as well as Discord tokens and Telegram data.

This second-stage payload also downloads and executes the final stealer, written in .NET, and exfiltrating it to a Discord webhook, which allows the malware to send the stolen info to a Discord channel.

The final malware harvests credentials from Firefox and Chromium-based web browsers, as well as cryptocurrency wallets (Armory, AtomicWallet, BitcoinCore, Bytecoin, DashCore, Electrum, Ethereum, LitecoinCore, Monero, Exodus, Zcash, Jaxx), VPNs (ProtonVPN, OpenVPN, NordVPN), and applications including Steam, Discord, FileZilla and Telegram.

It also collects information about the infected machine and captures screenshots before sending all of this data to the attackers’ Discord server.

While these kinds of attacks are reprehensible, it’s also a good reminder for the kids: Cheaters never win. ®



Source link

——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW