Hackers Exploit Godot Game Engine with New Malware, Infecting 17,000 Systems in 3 Months

by | Nov 28, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Hackers have weaponized the widely-used Godot game engine to launch the GodLoader malware, infecting over 17,000 devices in just three months. This malware exploits Godot’s scripting capabilities to evade detection and execute malicious code, impacting users on major platforms, including Windows, macOS, Linux, Android, and iOS.

Attack Overview

Check Point Research uncovered that GodLoader leverages Godot’s GDScript scripting language and .pck files (used to package game assets) to embed malicious scripts. Once executed, these files unleash malware that can:

  • Steal credentials.
  • Deploy additional payloads like the XMRig crypto miner, which generated over 200,000 visits to its Pastebin configuration file.

“Cybercriminals have exploited the Godot Engine since June 2024 to execute crafted GDScript code, delivering malware in a way that bypasses most antivirus tools,” says Check Point, highlighting the malware’s stealth capabilities.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses



Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Attack Chain

The malware is distributed via the Stargazers Ghost Network, a Malware Distribution-as-a-Service (DaaS) platform, using seemingly legitimate GitHub repositories. Key details of the campaign include:

  • 200+ malicious GitHub repositories managed by over 225 Stargazer Ghost accounts.
  • Four distinct attack waves between September 12 and October 3, 2024 targeting developers and gamers.
  • GitHub repositories forked and starred to appear on the trending section, increasing their perceived legitimacy.

Stargazer Goblin, the threat actor behind Stargazers Ghost Network, has operated this DaaS since at least August 2022, earning more than $100,000 by distributing malware like RedLine, Lumma Stealer, and Atlantida Stealer.

Attack chainAttack chain (Check Point)

Exploiting Godot Engine

While GodLoader primarily targets Windows systems, Check Point developed a proof-of-concept exploit to demonstrate its adaptability for Linux and macOS. However, Rémi Verschelde, a Godot Engine maintainer, clarified that the vulnerability is not inherent to Godot:

“The Godot Engine is a programming system with a scripting language, similar to Python or Ruby. Users must explicitly execute malicious files with the Godot runtime for an attack to occur.”

Godot does not automatically handle .pck files, meaning attackers must bundle their malicious payload with the runtime. As a result, these attacks require victims to manually unpack and run the files, making widespread exploitation more challenging than one-click malware.




Protecting Against GodLoader

To safeguard against this campaign:

  1. Download software only from trusted sources and verify the origin of game assets or tools.
  2. Avoid running unverified .pck files or unpacking bundles without understanding their contents.
  3. Developers should review GitHub repositories for suspicious activity or inconsistent commit histories.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This