Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » 1500+ Minecraft players infected with malicious Java software
Global Security

1500+ Minecraft players infected with malicious Java software

AdminBy AdminJune 18, 2025No Comments4 Mins Read
Minecraft Players
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Minecraft players

The new multi -stage malicious program is aimed at Minecraft users with malicious Java -based software, which uses distribution as a service (DAAS) called Network Ghost Stargazers Ghost.

“The company – Note In a report that shared with Hacker News.

“The malicious software pretended to be oering and housing, which are” macros scripts “(aka cheats). Both the first and the second stages are designed on Java and can only be performed if Minecraft is installed by the Hosta car.”

The ultimate goal of the attack is to cheat players in Minecraft MOD downloads with GitHub and deliver .Net Information Cteeler with comprehensive data theft. The company was first discovered by cybersecurity company in March 2025.

What makes the activity of the suitable, this use of an illegal offer called The Stargazers Ghost Network, which uses thousands of GITHUB accounts to create spoiled repository, which is masked as hacked software and read the games.

Cybersecurity

These malicious shelters, masking as Minecraft, serve as a popular video game with a Java loader (for example, “Oringo-11.9.jar”), which goes unnoticed by all antiviral engines as of writing.

Archive Java (Jar) files implement simple vM methods and anti -nausalization for detection efforts. Their main goal is to download and start another Jar file, theft of the second stage that receives and performs.

The second-degree component is derived from the IP address (“147.45.79.104”), which is stored in a format coded on the basis of 64, putting, essentially turning the Posts to Dead Drop.

“To add mods to the Minecraft game, the user must copy the malicious cape to the Minecraft Mods folder. After starting the game, the Minecraft process loads all the fashion folders, including malicious mods that will download and perform the second stage,” the researchers said.

In addition to downloading .Net theft, the second degree of theft is equipped for theft of discord and Minecraft tokens, as well as telegram data. On the other hand, theft .Net is able to prepare accounts from different web browsers and file collection, as well as information from cryptocurrencies and other applications such as Steam, and File.

It can also take screenshots and collect information related to launch processes, external IP system and the contents of the clipboard. The captured information is ultimately complete and transmitted by the attacker through Webhook’s disorder.

It is suspected that the company is the work of a Russian-speaking actor threatening because of the presence of several artifacts written in Russian, and a temporary belt of the attacker (UTC+03: 00). It is estimated that more than 1500 devices may have become the prey of this scheme.

“In this case, it is emphasized how popular game communities can be used as effective vectors to distribute malware, emphasizing the importance of caution when loading the contents of the third party,” the researchers said.

“The Ghost Shargazers network actively distributes this malicious software, focusing on Minecraft players who seek mods to improve their gameplay. What seemed harmless downloads, were, in fact, Java’s forklifts that unfolded two additional thefts.”

Revealed new options theft kimjongrat

Development comes when block 42 Palo Alto Networks described in detail two new options for Kodanamena’s Kimjongrat Information Theme Probably connected In addition, North Korean actor threatens behind Babysitter and Stolen pencil. Kimjongrat was discovered in the wild in May 2013, which was put as a secondary useful load in babysitting.

Cybersecurity

“One of the new options uses a portable executable file (PE) and the other uses PowerShell implementation,” Dominic’s security researcher – Note. “The PE and PowerShell options are initiated by clicking the Windows Fast Access File (LNK), which downloads the dropper file from the substitution account (CDN).

While the PE -Board dropper launches a loader belonging to PDF and text file, a dropper in the PowerShell version unfolds the PDF -adjusts along with the ZIP archive. The forklift, in turn, loads the auxiliary loads, including the theft for Kimjongrat.

The Zip archive, set by the PowerShell dropper, contains scripts that embed the theft based on Kimjongrat PowerShell and Keylogger components.

Both new incarnations are able to collect and transmit information about the sacrifice, files that meet certain extensions and browser data, such as credentials and details from expanding cryptocurrencies. The PE Kimjongrat option is also designed to collect FTP information and email.

“The development and deployment of Kimjongrat, which presents changes such as the use of the legitimate CDN server for dissemination, demonstrates an accurate and constant threat,” said Block 42. “This adaptation not only demonstrates a sustainable threat to such malicious software, but also emphasizes the development of the developers.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.