Cybercriminals Trojanize Popular Games to Bypass Security and Spread Malware

Cybercriminals have escalated their efforts to exploit popular video games as a vector for malware distribution, leveraging trojanized game installers to infiltrate systems and execute malicious payloads.

Recent investigations reveal that these campaigns target gamers’ trust in legitimate-looking software, often downloaded from unofficial sources or even reputable platforms like Steam.

Exploiting Gaming Platforms for Cryptomining and Data Theft

A prominent example of this threat comes from the “StaryDobry” campaign, which distributed trojanized versions of popular games such as BeamNG.drive and Garry’s Mod.

These compromised installers deployed the XMRig cryptominer, exploiting the high-performance hardware of gaming machines to mine cryptocurrency without user consent.

Malware
Installer screen

The campaign employed sophisticated evasion techniques, including anti-debugging checks and encrypted payloads, to bypass detection by security software.

Similarly, other malware campaigns have used games like Super Mario Forever to spread crypto-mining clients such as SupremeBot and data-stealing malware like Umbral Stealer.

According to SecureList, these malicious programs not only degrade system performance but also harvest sensitive information such as login credentials and cryptocurrency wallet data.

Malware on Official Platforms: A Growing Concern

Even official platforms are not immune. For instance, the game PirateFi, available on Steam, was found to contain malware disguised as a legitimate executable (Howard.exe).

Upon installation, it unpacked itself into the system’s temporary directory, stealing browser cookies and enabling unauthorized access to user accounts.

Despite being removed from Steam after detection, the incident underscores the risks associated with seemingly trustworthy sources.

Threat actors employ a variety of techniques to maximize their reach and impact:

  • Social Engineering: Users are lured into downloading trojanized installers through fake websites or torrent trackers.
  • Evasion Mechanisms: Malware uses encryption, spoofed file properties, and anti-debugging techniques to avoid detection.
  • Persistence: Some malware establishes persistence via scheduled tasks or registry modifications, ensuring continued operation even after system reboots.
Malware
Spoofed resources

These campaigns have affected users worldwide, with significant infections reported in regions like Russia, Brazil, Germany, and Kazakhstan.

While some evidence suggests Russian-speaking actors may be involved in certain campaigns, definitive attribution remains elusive due to the lack of clear links with known threat groups.

The exploitation of popular games for malware distribution highlights the growing sophistication of cybercriminal tactics.

Gamers are urged to exercise caution when downloading software and to rely on official sources and robust security solutions.

As gaming platforms continue to evolve, so too must cybersecurity measures to protect users from these escalating threats.

Also Read:

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here