fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Malware Hidden In Game Cheats And Mods Used To Target Gamers

Malware Hidden In Game Cheats And Mods Used To Target Gamers

Threat actors target gamers with backdoored game tweaks, patches, and cheats hiding malware capable of stealing information from infected systems.

The attackers mostly use social media channels and YouTube how-to videos for advertising their malware-laced modding-related game tools.

Cisco Talos researchers who spotted multiple campaigns using these tactics said that they’ve “seen several small tools looking like game patches, tweaks or modding tools” backdoored with obfuscated malware.

“These types of attacks are a return to form for classic virus campaigns — video game players are no strangers to trying to avoid malicious downloads while trying to change the game they’re playing,” the researchers said in a report published today.

One of the malware strains deployed on infected gamers’ computers is XtremeRAT (aka ExtRat), a commercially available remote access trojan (RAT) used in targeted attacks and traditional cybercrime since at least 2010.

Also Read: PDPA Singapore Guidelines: 16 Key Concepts For Your Business

XtremeRAT allows its operators to exfiltrate documents from compromised systems, log keystrokes, capture screenshots, record audio using webcams or microphones, directly interact with victims via remote shells, and more.

Designed to evade detection

The threat actors use a complex VisualBasic-based cryptor and shellcode to hinder analysis and detection, and hide the final payload deployed in their attacks.

Malware droppers deployed on gamers’ systems who executed the malicious game tools also employ process injection techniques to inoculate the malicious code into newly spawned processes.

This makes detection harder as it allows the malware to hide the final payload from some anti-malware tools.

“With the work from home trend not likely to end any time soon, there’s a highly increased use of private PC equipment to connect into company networks — this is a serious threat to enterprise networks,” Cisco Talos concluded.

“Employees will sometimes download modding tools or cheat engines from questionable sources to tweak their PC or games running on the same machine they use for their job.”

An attractive target

Game cheats are a known source of malware infections and have been used to infect gamers with remote access trojanscryptocurrency miners, and other malware strains.

But gamers have also been targeted in other, more complex attacks. For instance, last month, ESET researchers discovered that an unknown threat actor compromised the updating mechanism of an Android emulator for Windows and macOS to infect gamers with malware.

Popular games and a gaming platform owned by Asian companies were also hacked after a successful supply-chain attack, allowing the attackers to deploy backdoors on gamers’ systems.

Also Read: Data Protection Officer Singapore | 10 FAQs

Based on estimations and telemetry data, tens or hundreds of thousands of gamers were infected in this supply-chain attack, given how popular the hacked gaming platform and games were in Thailand, the Republic of the Philippines, and Taiwan.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us