For the first time a malware written in GDScript has been spotted in the wild. The attack vector are spam-repos on Github with infected cracked game executables targeting Windows devices. The code uses a bunch of OS.execute statements to run malicious shell code. More interesting are the employed anti-emulation techniques. One of them uses Godot’s rendering capability detection to check for 3D Video Acceleration.
[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4
=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place
Key takeaways of the report:
[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4
=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place
This is not a vulnerability in Godot but a nefarious actor crafting malicious GDScript code.
Read the full report here: https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/
Also see the statement of the Godot Security Team on this topic: https://godotengine.org/article/statement-on-godloader-malware-loader/
[#]GodotEngine #OpenSource #GameDev #Malware #InfoSec #Security #Godot4
=> More informations about this toot | More toots from GodotUserGroupBerlin@mastodon.gamedev.place
text/gemini
This content has been proxied by September (ba2dc).