Wednesday, April 23, 2025
Homecyber securityThreat Actors Trojanize Popular Games to Evade Security and Infect Systems

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games.

Exploiting the holiday season’s heightened torrent activity, the attackers distributed compromised game installers via torrent trackers.

Popular Games
Malicious torrent available for download

The campaign, which lasted for a month, primarily delivered the XMRig cryptominer to unsuspecting users in Russia, Brazil, Germany, Belarus, and Kazakhstan.

- Advertisement - Google News

Popular titles such as BeamNG.drive, Garry’s Mod, Dyson Sphere Program, and Universe Sandbox were weaponized to execute a complex infection chain.

Execution Chain

The attackers employed advanced methods to evade detection and ensure the malware’s success.

The trojanized installers were crafted using Inno Setup, embedding malicious payloads that were encrypted and hidden within legitimate-looking game files.

Upon execution, the installer decrypted these payloads using AES encryption and deployed them into the system’s temporary directories.

A key component of the attack involved anti-debugging checks to detect sandbox environments or debugging tools.

According to the Secure List, if such tools were found, the malware terminated its execution immediately, avoiding detection by security researchers.

Once past these checks, the malware registered itself using Windows utilities like regsvr32.exe and began collecting system fingerprints, including machine identifiers, usernames, operating system details, and hardware specifications. T

his information was encoded in Base64 format and transmitted to the attackers’ command-and-control (C2) servers.

The infection chain continued with the deployment of a miner implant that leveraged the victim’s CPU resources for cryptocurrency mining.

The malware dynamically adjusted its behavior based on system configurations to avoid overloading less powerful machines.

Global Impact on Users

The campaign primarily targeted individual gamers but also infected systems within corporate networks.

By focusing on gaming PCs often equipped with high-performance hardware the attackers maximized their mining efficiency.

Victims reported increased electricity bills and degraded system performance due to the resource-intensive mining operations.

Attribution and Implications

While no direct links to known threat groups have been established, evidence suggests that Russian-speaking actors may be behind this operation.

The campaign highlights an emerging trend where threat actors exploit popular games as vectors for malware distribution.

This tactic capitalizes on users’ trust in well-known titles and their willingness to download cracked or repackaged versions from unofficial sources.

The incident underscores the importance of cybersecurity awareness among gamers.

Downloading games from unauthorized platforms poses significant risks, as even official app stores are not immune to malware infiltration.

Developers and platform providers must adopt robust security measures to safeguard users against such threats.

This campaign serves as a stark reminder of the evolving tactics used by cybercriminals to exploit unsuspecting users.

By weaponizing popular games, they have demonstrated their ability to bypass traditional security measures and deliver malicious payloads effectively.

Gamers are urged to rely on legitimate sources for downloads and maintain up-to-date security solutions to mitigate risks associated with such attacks.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as...

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries...

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

APT34 Hackers Use Port 8080 for Fake 404 Responses and Shared SSH Keys

Researchers have uncovered early indicators of malicious infrastructure linked to APT34, also known as...

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users...

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries...