Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Gamers tricked into downloading Lua-based malware via fake scripting cheats
Global Security

Gamers tricked into downloading Lua-based malware via fake scripting cheats

AdminBy AdminOctober 8, 2024No Comments3 Mins Read
Lua-Based Malware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 8, 2024Ravi LakshmananMalware / Cybercrime

Lua-based malware

Users looking for cheats for the game are tricked into downloading Lua-based malware, which is able to secure the infected systems and deliver additional payloads.

“These attacks benefit from the popularity of Lua game engine add-ons among the student gaming community,” Shmuel Uzan, researcher at Morphisec. said a new report published today adds that “this strain of malware is widespread in North America, South America, Europe, Asia and even Australia.”

There were details about the company documented for the first time OALabs in March 2024, in which users downloaded a malware downloader written in Lua, using GitHub’s feature to host malicious payloads.

Cyber ​​security

McAfee Labs, in a the following analysisdetailed threat actors’ use of the same technique to deliver a variant of the RedLine information stealer by placing malware ZIP archives in legitimate Microsoft repositories.

“We have disabled user accounts and content in accordance with GitHub’s Acceptable Use Policies, which prohibit the publication of content that directly supports illegal active attacks or malware campaigns that cause technical harm,” GitHub told The Hacker News at the time.

Lua-based malware

“We continue to invest in improving the security of GitHub and our users, and we are looking at ways to better protect against this activity.”

Analysis of Morphisec’s activities revealed a shift in the malware’s delivery mechanism, a simplification that is likely an attempt to fly under the radar.

“Malware is often delivered using obfuscated Lua scripts instead of compiled Lua bytecode, as the latter can be more easily suspected,” Ouzan said.

However, the overall infection chain remains the same in that users who Google popular scripting cheat engines like Solara and Electron are presented with fake websites that embed links to mined ZIP archives in various GitHub repositories.

The ZIP archive comes with four components: a Lua compiler, a Lua runtime interpreter DLL (“lua51.dll”), an obfuscated Lua script, and a batch file (“launcher.bat”), the latter of which is used to execute a Lua script using the Lua compiler.

Cyber ​​security

In the next step, the loader, ie. a malicious Lua script, establishes communication with the command and control (C2) server and sends detailed information about the infected system. In response, the server issues tasks that are either responsible for keeping things safe, hiding processes, or loading new payloads like Redone Stealer or CypherIT downloader.

“Information thieves are gaining prominence in the landscape as credentials obtained from these attacks are sold to more sophisticated groups for use in later stages of the attack,” Uzan said. “RedLine in particular has a huge market on the Dark Web selling these harvested credentials.”

Fake script cheating mechanisms

The disclosure comes days after Kaspersky reported that users looking for pirated versions of the popular software on Yandex were targeted in a campaign to spread an open-source cryptocurrency miner called SilentCryptoMiner using the compiled AutoIt binary implant.

Most of the attacks were directed at users from Russia, followed by Belarus, India, Uzbekistan, Kazakhstan, Germany, Algeria, the Czech Republic, Mozambique and Turkey.

“The malware was also distributed through Telegram channels targeting crypto investors, as well as in the descriptions and comments of YouTube videos about cryptocurrency, cheats and gambling,” the company said in a statement. said in last week’s report.

“Although the attackers’ main goal is to profit by secretly mining cryptocurrency, some variants of the malware can perform additional malicious activities, such as replacing cryptocurrency wallets in the clipboard and taking screenshots.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.