Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines

Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines

October 8, 2024 at 01:15PM

Users searching for game cheats are lured into downloading Lua-based malware, with a focus on gaming engine supplements. The malware establishes persistence on infected systems, delivering additional payloads. Techniques include GitHub exploitation, targeting gaming communities worldwide. Researchers emphasize a shift to obfuscated Lua scripts as a means of evading detection. Additionally, users seeking pirated software are targeted with a cryptocurrency miner.

Key takeaways from the meeting notes on malware and cybercrime include:

– Users searching for game cheats are being tricked into downloading a Lua-based malware that can establish persistence on infected systems and deliver additional payloads.
– The malware strain is prevalent across North America, South America, Europe, Asia, and Australia.
– The campaign involves luring users into downloading a malware loader written in Lua by exploiting vulnerabilities in platforms like GitHub.
– The malware is frequently delivered using obfuscated Lua scripts instead of compiled Lua bytecode to avoid triggering suspicion.
– Once infected, the malware establishes communication with a command-and-control (C2) server, potentially leading to the installation of information stealers like RedLine and CypherIT Loader.
– In a separate campaign, users seeking pirated versions of popular software on Yandex are targeted to distribute a cryptocurrency miner named SilentCryptoMiner, with additional malicious activities such as replacing cryptocurrency wallets in the clipboard and taking screenshots.
– The attacks are distributed through various platforms including Telegram channels and YouTube videos related to cryptocurrency, cheats, and gambling.

Would you like further details on any specific aspect of the meeting notes?

Full Article