{"id":328,"date":"2024-11-29T03:30:16","date_gmt":"2024-11-29T03:30:16","guid":{"rendered":"https:\/\/www.batteryone.co\/blog\/?p=328"},"modified":"2024-11-29T03:30:16","modified_gmt":"2024-11-29T03:30:16","slug":"godloader-malware-infects-over-17000-devices-through-game-development-tools","status":"publish","type":"post","link":"https:\/\/www.batteryone.co\/blog\/archives\/328","title":{"rendered":"GodLoader malware infects over 17000 devices through game development tools"},"content":{"rendered":"\n<p>A new cyber-attack technique leveraging the Godot Gaming Engine to execute undetectable malware has been reported by Check Point Research.<\/p>\n\n\n\n<p>Check Point says since late June 2024, crooks have been building malicious code written in GDscript (Godot\u2019s Python-like scripting language) calling on some 200 GitHub repositories and more than 220 Stargazer Ghost accounts, which were hosting a piece of malware called GodLoader.<\/p>\n\n\n\n<p>In a statement, the Godot security team said, \u201cBased on the report, affected users thought they were downloading and executing cracks for paid software, but instead executed the malware loader.\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"551\" src=\"https:\/\/www.batteryone.co\/blog\/wp-content\/uploads\/2024\/11\/1129-2-1024x551.png\" alt=\"\" class=\"wp-image-329\" srcset=\"https:\/\/www.batteryone.co\/blog\/wp-content\/uploads\/2024\/11\/1129-2-1024x551.png 1024w, https:\/\/www.batteryone.co\/blog\/wp-content\/uploads\/2024\/11\/1129-2-300x161.png 300w, https:\/\/www.batteryone.co\/blog\/wp-content\/uploads\/2024\/11\/1129-2-768x413.png 768w, https:\/\/www.batteryone.co\/blog\/wp-content\/uploads\/2024\/11\/1129-2.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Infostealers and cryptojackers<\/h2>\n\n\n\n<p>The Godot Engine, widely known for creating 2D and 3D games, is recognized for its versatility and cross-platform capabilities. It allows game developers to bundle assets and executable scripts into .pck files. Threat actors exploited this functionality by embedding malicious GDscript code in these files, enabling malware execution when loaded.<\/p>\n\n\n\n<p>The distribution of GodLoader occurred through the Stargazers Ghost Network, a malware-as-a-service platform. Between September and October 2024, 200 GitHub repositories were used to deliver infected files, targeting gamers, developers and general users.<\/p>\n\n\n\n<p>The repositories mimicked legitimate software repositories, leveraging GitHub actions to appear frequently updated and gain credibility.<\/p>\n\n\n\n<p>Notably, the GodLoader payloads were hosted on Bitbucket.org and distributed across four attack waves.<\/p>\n\n\n\n<p>Each campaign involved malicious archives downloaded thousands of times. Initial payloads included RedLine Stealer and XMRig cryptocurrency miners, with threat actors continuously evolving their tactics for greater evasion.<\/p>\n\n\n\n<p>Godot\u2019s security team said that the Gaming Engine does not register a file handler for .pck files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file.&nbsp;<\/p>\n\n\n\n<p>There is no way for a malicious actor to create a \u201cone-click exploit\u201d, barring other OS-level vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Potential Risks and Mitigation Strategies<\/h2>\n\n\n\n<p>By replacing original .pck files or sections within executables, attackers could target a vast player base. While not yet observed, this scenario underscores the need for robust encryption and asymmetric key methods to secure game data.<\/p>\n\n\n\n<p>Since GodLoader is yet to be flagged by most antivirus programs, it is essential to remain vigilant at this time, and careful when dealing with Godot-related content.<\/p>\n\n\n\n<p>To reduce risks, developers should also ensure software and systems are up to date, exercise caution with unfamiliar repositories and downloads, and increase cybersecurity awareness within organizations.<\/p>\n\n\n\n<p>In a statement, the Godot security team said, \u201cUsers who merely have a Godot game or editor installed on their system are not specifically at risk. We encourage people to only execute software from trusted sources \u2013 whether it\u2019s written using Godot or any other programming system.\u201d<\/p>\n\n\n\n<p>They added, \u201cWe thank Check Point Research for following the security guidelines of responsible disclosure, which let us confirm that this attack vector, while unfortunate, is not specific to Godot and does not expose a vulnerability in the engine or for its users.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new cyber-attack technique leveraging the Godot Gaming Engine to execute undetectable malware has been reported by Check Point Research. Check Point says since late June 2024, crooks have been building malicious code written in GDscript (Godot\u2019s Python-like scripting language) calling on some 200 GitHub repositories and more than 220 Stargazer Ghost accounts, which were [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":1,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":330,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/posts\/328\/revisions\/330"}],"wp:attachment":[{"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.batteryone.co\/blog\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}