Antivirus

Gamers at risk as scammers are using malware-infected cheats and mods to steal passwords and crypto — here’s how to stay safe

Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data Verified crypto wallets like MetaMask and Exodus are being drained through browser injection Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing


  • Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data
  • Verified crypto wallets like MetaMask and Exodus are being drained through browser injection
  • Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions

Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing themselves to sophisticated malware, experts have warned.

Recent findings from Dr.Web revealed a malware family known as “Trojan.Scavenger” which targets Windows users by disguising itself as cheats or enhancements for popular games.

This seemingly harmless mod can ultimately compromise crypto wallets, password managers, and web browsers, posing serious risks to user privacy and digital assets.

You may like

  • GTA VI personages Experts warn GTA and Minecraft being used to lure in cyberattack victims – here’s how to stay safe
  • Best cheap game server hosts appeals to Minecraft users Minecraft players watch out – these fake mods are hiding password-stealing malware
  • Malware Criminals are using a dangerous fake free VPN to spread malware via GitHub – here’s how to stay safe

When cheats become covert threats

The infection chain begins when users download ZIP archives claiming to improve performance in games including the likes of Grand Theft Auto 5 or Oblivion Remastered.

These archives contain modified dynamic libraries, sometimes renamed with extensions like .ASI to resemble legitimate plugin formats.

When the user follows the installation instructions, the malicious library is placed in the same folder as the target game. If the game does not properly validate its libraries, the trojan loads automatically at startup.

In some cases, flaws in library search priorities are essential to the malware’s success, allowing it to hijack execution within the host application.

Once loaded, the malware establishes contact with a command-and-control server using encrypted communication. This process includes verifying encryption keys and checking timestamp consistency, which is meant to evade analysis and block antivirus detection.

The malware doesn’t stop with the initial payload. In more complex infections, it deploys additional trojans that embed themselves in Chromium-based browsers like Chrome, Edge, Opera, and Yandex.

These troj

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

NITDA raises alarm on DeepLoad AI malware attacks, proffers solutions

“Never paste commands from a website into your computer; legitimate software never asks for this. Do not open files named ‘Chrome Setup’ or ‘Firefox Installer’ from USB drives; scan all USB devices with antivirus software before use,” the agency said, warning corporate companies of possible cyber attacks…

“Never paste commands from a website into your computer; legitimate software never asks for this. Do not open files named ‘Chrome Setup’ or ‘Firefox Installer’ from USB drives; scan all USB devices with antivirus software before use,” the agency said, warning corporate companies of possible cyber attacks…
Read More

Continue Reading
Antivirus

The Main Street Tech Report: Microsoft Says Third Party Antivirus Software Is No Longer Needed

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports
Read More

Continue Reading
Antivirus

Researchers warn Microsoft Defender vulnerability is already being exploited

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…
Read More

Continue Reading
Antivirus

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …
Read More

Continue Reading