Blog Layout

Gamers Targeted By Hackers Through Code And Cheat Downloads

sccomputerguys • Apr 19, 2021

Gamers tend to be surprisingly tech savvy, and as such, they're a bit harder to trick with social engineering than many other groups.

Gamers do have a weakness, and it's one that hackers around the world have recently begun to exploit in a systematic way.

Increasingly, security researchers are finding instances of poisoned cheat codes.

The basic idea is the gamer in question downloads a set of cheat codes for his or her current obsession. Lurking inside it is an embedded bit of malicious code, capable of deploying back doors to allow for further malware infection, as well as keystroke logging code. That enables the hackers controlling it to capture a wide range of passwords and other personal information from the compromised system.

Even worse, there's a growing body of evidence that hackers are launching supply chain attacks against game development companies themselves. They're specifically targeting Asian companies in a bid to infect vast numbers of systems, and based on initial estimates, it's working. Security professionals who are tracking the trend now estimate that there could be hundreds of thousands of infected systems around the world, making this a quietly growing threat that has, until now, gone largely unnoticed.

If that wasn't bad enough, and given that the hackers know that gamers tend to be tech savvy, they're specifically designing the malware they're using against them to actively evade detection, making them notoriously hard to pin down on an infected system.

All that to say if you are a gamer, and you enjoy making use of cheat codes to shortcut the time it would otherwise take to master the game, beware. Hackers all over the planet are now targeting you. It seems nothing and no one is safe these days.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: