Ancestors

Written by Godot UserGroup Berlin :godot: on 2024-11-30 at 23:12

For the first time a malware written in GDScript has been spotted in the wild. The attack vector are spam-repos on Github with infected cracked game executables targeting Windows devices. The code uses a bunch of OS.execute statements to run malicious shell code. More interesting are the employed anti-emulation techniques. One of them uses Godot’s rendering capability detection to check for 3D Video Acceleration.


[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4

=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place

Written by Godot UserGroup Berlin :godot: on 2024-11-30 at 23:13

Key takeaways of the report:

[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4

=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place

Toot

Written by Godot UserGroup Berlin :godot: on 2024-11-30 at 23:13

This is not a vulnerability in Godot but a nefarious actor crafting malicious GDScript code.



Read the full report here: https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/



Also see the statement of the Godot Security Team on this topic: https://godotengine.org/article/statement-on-godloader-malware-loader/


[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4

=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place

Descendants

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113574439657942677
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
307.504533 milliseconds
Gemini-to-HTML Time
0.543393 milliseconds

This content has been proxied by September (ba2dc).