this post was submitted on 29 Nov 2024
38 points (97.5% liked)

gamedev

359 readers
12 users here now

Game Development

Free Resources List

founded 2 years ago
MODERATORS
 

​Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months.

As Check Point Research found while investigating the attacks, threat actors can use this malware loader to target gamers across all major platforms, including Windows, macOS, Linux, Android, and iOS.

It's also used to leverage Godot's flexibility and its GDScript scripting language capabilities to execute arbitrary code and bypass detection systems using the game engine .pck files, which package game assets, to embed harmful scripts.

The attackers delivered the GodLoader malware through the Stargazers Ghost Network, a malware Distribution-as-a-Service (DaaS) that masks its activities using seemingly legitimate GitHub repositories.

Between September and October 2024, they used over 200 repositories controlled by over 225 Stargazer Ghost accounts to deploy the malware to targets' systems, exploiting potential victims' trust in open-source platforms and seemingly legitimate software repositories.

Throughout the campaign, Check Point detected four separate attack waves against developers and gamers between September 12 and October 3, enticing them to download infected tools and games.

top 5 comments
sorted by: hot top controversial new old
[–] Speaker@hexbear.net 13 points 2 months ago

They targeted gamers, etc.

[–] morte@hexbear.net 8 points 2 months ago

Daaaaaamn thats terrible

[–] PorkrollPosadist@hexbear.net 8 points 2 months ago

Script kiddies. Not much has changed in the past 20 years, since people used Game Maker as a toolkit for building malware.

[–] 4am@lemm.ee 5 points 2 months ago

This is absolutely nothing

[–] darkcalling@hexbear.net 5 points 2 months ago

This is actually interesting in that one doesn't tend to think of game-engine scripts as being a threat vector. Most talk of scripting threats is in a corporate context where they wouldn't have such software so it's you know common stuff like cmdlets, powershell, python, C#, stuff like that and locking that down in high security environments is common. So it's a bit clever in that.