• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
gamers tricked into downloading lua based malware via fake cheating script

Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines

You are here: Home / General Cyber Security News / Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines
October 8, 2024

Users searching for game cheats are being tricked into downloading a Lua-based malware that is capable of establishing persistence on infected systems and delivering additional payloads.

“These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community,” Morphisec researcher Shmuel Uzan said in a new report published today, adding “this malware strain is highly prevalent across North America, South America, Europe, Asia, and even Australia.”

Details about the campaign were first documented by OALabs in March 2024, in which users were lured into downloading a malware loader written in Lua by exploiting a quirk in GitHub to stage malicious payloads.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

McAfee Labs, in a subsequent analysis, detailed threat actors’ use of the same technique to deliver a variant of the RedLine information stealer by hosting the malware-bearing ZIP archives within legitimate Microsoft repositories.

“We disabled user accounts and content in accordance with GitHub’s Acceptable Use Policies, which prohibit posting content that directly supports unlawful active attack or malware campaigns that are causing technical harms,” GitHub told The Hacker News at the time.

Lua-Based Malware

“We continue to invest in improving the security of GitHub and our users, and are looking into measures to better protect against this activity.”

Morphisec’s analysis of the activity has uncovered a shift in the malware delivery mechanism, a simplification that’s likely an effort to fly under the radar.

“The malware is frequently delivered using obfuscated Lua scripts instead of compiled Lua bytecode, as the latter can trigger suspicion more easily,” Uzan said.

That said, the overall infection chain remains unchanged in that users searching popular cheating script engines like Solara and Electron on Google are served fake websites that embed links to booby-trapped ZIP archives on various GitHub repositories.

The ZIP archive comes with four components: A Lua compiler, a Lua runtime interpreter DLL (“lua51.dll”), an obfuscated Lua script, and a batch file (“launcher.bat”), the last of which is used to execute the Lua script using the Lua compiler.

Cybersecurity

In the next stage, the loader – i.e., the malicious Lua script – establishes communications with a command-and-control (C2) server and sends details about the infected system. The server, in response, issues tasks that are either responsible for maintaining persistence or hiding processes, or downloading new payloads such as Redone Stealer or CypherIT Loader.

“Infostealers are gaining prominence in the landscape as the harvested credentials from these attacks are sold to more sophisticated groups to be used in later stages of the attack,” Uzan said. “RedLine notably has a huge market in Dark web selling these harvested credentials.”

Fake Cheating Script Engines

The disclosure comes days after Kaspersky reported that users looking for pirated versions of popular software on Yandex are being targeted as part of a campaign designed to distribute an open-source cryptocurrency miner named SilentCryptoMiner by means of an AutoIt compiled binary implant.

A majority of the attacks targeted users in Russia, followed by Belarus, India, Uzbekistan, Kazakhstan, Germany, Algeria, the Czech Republic, Mozambique, and Turkey.

“Malware was also distributed through Telegram channels targeted at crypto investors and in descriptions and comments on YouTube videos about cryptocurrency, cheats, and gambling,” the company said in a report last week.

“Even though the main goal of the attackers is to make profit by stealthily mining cryptocurrency, some variants of the malware can perform additional malicious activity, such as replacing cryptocurrency wallets in the clipboard and taking screenshots.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cyberattack group 'awaken likho' targets russian government with advanced tools Cyberattack Group ‘Awaken Likho’ Targets Russian Government with Advanced Tools
Next Post: Zero-Day Alert: Three Critical Ivanti CSA Vulnerabilities Actively Exploited zero day alert: three critical ivanti csa vulnerabilities actively exploited»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.