• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Hackers target gamers with a supply-chain attack

You are here: Home / General Cyber Security News / Hackers target gamers with a supply-chain attack

hands holding games controller

Shutterstock

Security scientists have identified hackers have compromised an Android emulator and used it to infect gamers’ products with malware.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Premium Security 2021

Protect yourself against all threads using AVAST Premium Security. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium.

Get AVAST Premium Security with 60% discount from our partner: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


In accordance to researchers at ESET, a new provide-chain attack compromising the update system of NoxPlayer, an Android emulator that assists 150 million end users all over the world participate in cell game titles on their PCs and Macs, was learned late final thirty day period.

Now, the offer-chain attack has contaminated players in Asia with 3 malware strains. There is no indication of hackers employing the malware for financial get, but scientists have learned hackers are applying the malware for surveillance.

The enterprise at the rear of NoxPlayer is Hong Kong-based mostly BigNox, and NightScout is the cyber prison group initiating the attacks. Security researchers mentioned hackers compromised BigNox’s res06.bignox.com storage servers and abused the api.bignox.com API infrastructure to put in payloads. 

As of this composing, BigNox has denied becoming affected by the intrusion.

Scientists found indicators of compromise in September 2020, but it was not right until January 25 that they uncovered explicitly malicious action. They immediately reported the malicious exercise to BigNox.

“We have enough proof to state that the BigNox infrastructure (res06.bignox.com) was compromised to host malware, and to suggest that their HTTP API infrastructure (api.bignox.com) could have been compromised. In some scenarios, more payloads ended up downloaded by the BigNox updater from attacker-managed servers,” scientists stated.

According to additional investigations, researchers reported that out of the 100,000 of its buyers that also had NoxPlayer mounted, only five acquired a destructive update. They stated this showed that “Operation NightScout” as they identified as it, was a “highly qualified operation.” 

Victims are based in Taiwan, Hong Kong, and Sri Lanka. Researchers have not but discovered any evidence of afflicted gamers in the US.

“We were unsuccessful locating correlations that would recommend any relationships amid victims. Nonetheless, primarily based on the compromised software in concern and the sent malware exhibiting surveillance capabilities, we believe this may reveal the intent of collecting intelligence on targets by some means included in the gaming community,” stated scientists.

Researchers explained that players really should “perform a common reinstall from clean up media” in situation of intrusion.

“For non-compromised buyers: do not down load any updates until BigNox notifies that it has mitigated the danger,” added researchers.


Some components of this post are sourced from:
www.itpro.co.uk

Previous Post: «Sc Product Reviews: Identity & Access Management SC Product Reviews: Identity & Access Management

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers target gamers with a supply-chain attack
  • SC Product Reviews: Identity & Access Management
  • SC Product Reviews: Identity & Access Management
  • Facial Recognition Ethical Framework Launched by BSIA
  • UKRI services taken offline after ransomware attack
  • Hackers attempt to exploit SonicWall zero-day vulnerability
  • A New Software Supply‑Chain Attack Targeted Millions With Spyware
  • LIVE Webinar: Major Lessons to be Learned from Top Cyber Attacks in 2020
  • Researchers Spot SonicWall Exploit in the Wild
  • New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.