Antivirus

Gamers at risk as scammers are using malware-infected cheats and mods to steal passwords and crypto — here’s how to stay safe

Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data Verified crypto wallets like MetaMask and Exodus are being drained through browser injection Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing


  • Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data
  • Verified crypto wallets like MetaMask and Exodus are being drained through browser injection
  • Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions

Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing themselves to sophisticated malware, experts have warned.

Recent findings from Dr.Web revealed a malware family known as “Trojan.Scavenger” which targets Windows users by disguising itself as cheats or enhancements for popular games.

This seemingly harmless mod can ultimately compromise crypto wallets, password managers, and web browsers, posing serious risks to user privacy and digital assets.

You may like

  • GTA VI personages Experts warn GTA and Minecraft being used to lure in cyberattack victims – here’s how to stay safe
  • Best cheap game server hosts appeals to Minecraft users Minecraft players watch out – these fake mods are hiding password-stealing malware
  • Malware Criminals are using a dangerous fake free VPN to spread malware via GitHub – here’s how to stay safe

When cheats become covert threats

The infection chain begins when users download ZIP archives claiming to improve performance in games including the likes of Grand Theft Auto 5 or Oblivion Remastered.

These archives contain modified dynamic libraries, sometimes renamed with extensions like .ASI to resemble legitimate plugin formats.

When the user follows the installation instructions, the malicious library is placed in the same folder as the target game. If the game does not properly validate its libraries, the trojan loads automatically at startup.

In some cases, flaws in library search priorities are essential to the malware’s success, allowing it to hijack execution within the host application.

Once loaded, the malware establishes contact with a command-and-control server using encrypted communication. This process includes verifying encryption keys and checking timestamp consistency, which is meant to evade analysis and block antivirus detection.

The malware doesn’t stop with the initial payload. In more complex infections, it deploys additional trojans that embed themselves in Chromium-based browsers like Chrome, Edge, Opera, and Yandex.

These troj

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Hackers abuse Triofox antivirus feature to deploy remote access tools

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet’s Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. …

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet’s Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. …
Read More

Continue Reading
Antivirus

Moonlock review: We put MacPaw’s new antivirus suite to work

Macworld At a glanceExpert’s Rating Pros Excellent viral and malware protection and detection Good purchase options Access to learning tools and YouTube links Cons Security Advisor module lacks functionality Menus don’t offer enough clarity sScan scheduler only allowing for 15-minute increments VPN auto-connects to the closest server Our Verdict Moonlock isn’t perfect…

Macworld

At a glanceExpert’s Rating

Pros

Excellent viral and malware protection and detection

Good purchase options

Access to learning tools and YouTube links

Cons

Security Advisor module lacks functionality

Menus don’t offer enough clarity

sScan scheduler only allowing for 15-minute increments

VPN auto-connects to the closest server

Our Verdict
Moonlock isn’t perfect…
Read More

Continue Reading
Antivirus

Avast Free Antivirus for Mac review: Basic protection, for free

Macworld At a glanceExpert’s Rating Pros Easy installation and setup Solid customization options such as whitelists, exceptions, and scheduled scans Handy network tools like Traffic Monitor and Network Inspector Cons Steady stream of ads, upgrade prompts, and assorted locked features The Web Guard module failed to catch obvious scam links The Scam Guard failed to

Macworld

At a glanceExpert’s Rating

Pros

Easy installation and setup

Solid customization options such as whitelists, exceptions, and scheduled scans

Handy network tools like Traffic Monitor and Network Inspector

Cons

Steady stream of ads, upgrade prompts, and assorted locked features

The Web Guard module failed to catch obvious scam links

The Scam Guard failed to detect scam…
Read More

Continue Reading
Antivirus

OpenAI’s shiny new Atlas browser might have some serious security shortcomings – and it’s not the only one under threat from dangerous spoof attacks

Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn Malicious extensions need only minimal permissions to cause maximum chaos AI browsers risk turning helpful automation into channels for silent data theft New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have


  • Fake AI sidebars can perfectly imitate real ones to steal secrets, experts warn
  • Malicious extensions need only minimal permissions to cause maximum chaos
  • AI browsers risk turning helpful automation into channels for silent data theft

New “agentic” browsers which offer an AI-powered sidebar promise convenience but may widen the window for deceptive attacks, experts have warned.

Researchers from browser security firm SquareX found a benign-looking extension can overlay a counterfeit sidebar onto the browsing surface, intercept inputs, and return malicious instructions that appear legitimate.

This technique undermines the implicit trust users place in in-browser assistants and makes detection difficult because the overlay mimics standard interaction flows.

You may like

  • ChatGPT Atlas OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
  • Representational image of a hacker Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
  • Two hands typing on a laptop keyboard with a warning exclamation mark above it The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes

How the spoofing works in practice

The attack uses extension features to inject JavaScript into web pages, rendering a fake sidebar that sits above the genuine interface and captures user actions.

Reported scenarios include directing users to phishing sites and capturing OAuth tokens through fake file-sharing prompts. It also recommends commands that install remote access backdoors on victims’ devices.

The consequences escalate quickly when these instructions involve account credentials or automated workflows.

Many extensions request broad permissions, such as host access and storage, that are commonly granted to productivity tools, which reduces the value of permission analysis as a detection method.

Conventional antivirus suites and browser permission models were not designed to recognize a deceptive overlay that never modifies the browser code itself.

As more vendors integrate sidebars across major browser families, the collective attack surface expands and becomes harder to secure.

Users should treat in-browser AI assistants as experimental features and avoid handling sensitive data or authorizing account linkages through them, because doing so can greatly raise the risk of compromise.

You may like

  • ChatGPT Atlas OpenAI’s new Atlas browser may have some extremely concerning security issues, experts warn – here’s what we know
  • Representational image of a hacker Millions of users have fallen victim to malicious browser extensions because of a critical flaw, but things are changing — here’s what you need to know
  • Two hands typing on a laptop keyboard with a warning exclamation mark above it The surveillance browser trap: AI companies are copying Big Tech’s worst privacy mistakes

Security teams should tighten extension governance, implement stronger endpoint controls, and monitor for abnormal OAuth activity to reduce risk.

The threat also links directly to identity theft when fraudulent interfaces harvest credentials and session tokens with convincing accuracy.

Agentic browsers introduce new convenience while also creating new vectors for social engineering and technical abuse.

Therefore, vendors need to build interface integrity checks, improve extension vetting, and provide clearer guidance about acceptable use.

Until those measures are widely established and audited, users and organizations should remain skeptical about trusting sidebar agents with any tasks involving sensitive accounts.

Security teams and vendors must prioritize practical mitigations, including mandatory code audits for sidebar components and transparent update logs that users and administrators can review regularly.

Via BleepingComputer


Best antivirus software header
The best antivirus for all budgets

Our top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mob

Read More

Continue Reading