Source |
Checkpoint |
Identifiant |
8618040 |
Date de publication |
2024-11-27 13:00:55 (vue: 2024-11-27 15:08:13) |
Titre |
The Exploitation of Gaming Engines: A New Dimension in Cybercrime |
Texte |
>Executive Summary Check Point Research discovered a new technique using Godot Engine, a popular open-source game engine, to execute malicious code that executes nefarious commands and delivers malware and largely remains undetected. This innovative method enables cybercriminals to compromise devices across different platforms, including Windows, macOS, Linux, Android, and iOS. The Stargazers Ghost Network, a GitHub network that distributes malware as a service, distributes the malicious code and, in just three months, has infected over 17,000 machines. Potential attack scenarios can impact over 1.2 million users’ games developed with Godot by exploiting legitimate Godot executables to load harmful content through […]
>Executive Summary Check Point Research discovered a new technique using Godot Engine, a popular open-source game engine, to execute malicious code that executes nefarious commands and delivers malware and largely remains undetected. This innovative method enables cybercriminals to compromise devices across different platforms, including Windows, macOS, Linux, Android, and iOS. The Stargazers Ghost Network, a GitHub network that distributes malware as a service, distributes the malicious code and, in just three months, has infected over 17,000 machines. Potential attack scenarios can impact over 1.2 million users’ games developed with Godot by exploiting legitimate Godot executables to load harmful content through […]
|
Notes |
★★
|
Envoyé |
Oui |
Condensat |
000 >executive across android attack can check code commands compromise content cybercrime cybercriminals delivers developed devices different dimension discovered distributes enables engine engines: executables execute executes exploitation exploiting game games gaming ghost github godot harmful has impact including infected innovative ios just largely legitimate linux load machines macos malicious malware method million months nefarious network new open over platforms point popular potential remains research scenarios service source stargazers summary technique three through undetected users’ using windows |
Tags |
Malware
Mobile
|
Stories |
|
Move |
|