Hackers abuse popular Godot game engine to infect thousands of PCs

Hackers abuse popular Godot game engine to infect thousands of PCs

November 27, 2024 at 04:19PM

Hackers have leveraged the GodLoader malware to exploit the Godot game engine, infecting over 17,000 systems in under three months. Utilizing GDScript, they bypass detection and deliver malicious payloads via GitHub repositories. The attackers operate through the Stargazers Ghost Network, targeting gamers across multiple platforms while evading antivirus tools.

### Meeting Takeaways:

1. **GodLoader Malware Overview**:
– New GodLoader malware targets the Godot game engine, infecting over 17,000 systems in three months.
– It exploits Godot’s flexibility and GDScript capabilities to run arbitrary code and evade detection.

2. **Platform Reach**:
– The malware affects all major platforms: Windows, macOS, Linux, Android, and iOS.
– Attackers use game engine .pck files to embed harmful scripts that execute malicious code on victim devices.

3. **Malicious Outcomes**:
– Successfully loads additional payloads, including XMRig crypto miner.
– A private Pastebin file hosted the miner’s configuration, visited 206,913 times during the campaign.

4. **Undetected Attacks**:
– The attacks utilize crafted GDScript code to launch malware, remaining undetected by most antivirus software.
– Large-scale impact detected since June 29, 2024.

5. **Community & Vulnerability**:
– The Godot engine has a robust community with over 2,700 contributors and 80,000 followers across various platforms.
– Attackers exploit trust in open-source platforms to deliver malware through seemingly legitimate GitHub repositories.

6. **Attack Delivery Network**:
– The Stargazers Ghost Network, a malware Distribution-as-a-Service platform, masked its activities through over 200 GitHub repositories controlled by over 225 accounts.
– Four attack waves occurred between September 12 and October 3, 2024, targeting developers and gamers.

7. **Future Threats**:
– While primary samples targeting Windows were detected, potential adaptations for Linux and macOS are evident.
– Stargazer Goblin, the threat actor behind these attacks, has been active since at least August 2022, generating over $100,000.

8. **Malware Network Activities**:
– Uses over 3,000 GitHub “ghost” accounts to enhance the legitimacy of malicious repositories, pushing them into GitHub’s trending section to attract more victims.

### Action Items:
– Increase awareness and education regarding the risks associated with using third-party repositories and open-source tools.
– Monitor ongoing developments regarding the GodLoader malware and related cybersecurity threats.
– Consider implementing enhanced detection measures or software updates to safeguard against known threats targeting the Godot engine.

Full Article