Hackers target game developers with advanced malware

Hack enabled Winnti to compromise build systems and steal in-game currencies

Researchers from the Slovakian security company ESET have attributed a recent hack that infected several Massively Multiplayer Online (MMO) game makers to Winnti, a hacking group that has been active since as early as 2012. Previous targets of the group have included Chinese journalists, the Taiwanese government and many tech organizations. Most recently, though, the group has taken aim at game developers, pushing malware-filled apps in hopes of stealing in-game currencies.

Advertisement - Article continues below

In a post published Thursday morning, ESET detailed its discovery of a new, modular backdoor it calls PipeMon. Designed to function as a print processor, Winnti used the backdoor against multiple video gaming companies based in South Korea and Taiwan that develop MMO-style games. 

ESET found that, in one case, Winnti was able to compromise a victim’s entire build system using PipeMon. In doing so, Winnti made it possible for threat actors to trojanize game executables. In another case identified by ESET, compromised game servers allowed hackers to manipulate in-game currencies for financial gain.

Multiple factors led ESET them to attribute this most recent hacking campaign to Winnti. Not did PipeMon use some of the same domains as previous Winnti campaigns, but Winnti malware had already been found at some of the companies compromised by the PipeMon attacks. 

Advertisement
Advertisement - Article continues below

Active since at least 2012, Winnti is responsible for a number of high-profile supply-chain attacks against the software industry. Many of these attacks have led to the inconvenient distribution of trojanized software the group uses to compromise additional unsuspecting victims. Before PipeMon, ESET says Winnti’s most recent attacks included leveraging a ShadowPad backdoor to target two Hong Kong universities.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/hacking/355774/nigerian-hackers-swindle-millions-of-dollars-from-unemployment-systems
hacking

Nigerian hackers swindle millions of dollars from unemployment systems

22 May 2020
Visit/security/hacking/355773/hackers-take-on-unsuspecting-airliners-exposing-customer-data
hacking

Hackers take on unsuspecting airliners, exposing customer data

22 May 2020
Visit/security/hacking/355738/security-service-of-ukraine-arrests-infamous-hacker-sanix
hacking

Security Service of Ukraine arrests infamous hacker Sanix

21 May 2020
Visit/security/hacking/355586/15-biggest-hacks-of-the-2010s
hacking

15 biggest hacks of the 2010s

8 May 2020

Most Popular

Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

5 May 2020
Visit/mobile/5g/355712/nokia-5g-speed-record
5G

Nokia breaks 5G record with speeds nearing 5Gbps

20 May 2020
Visit/cloud/cloud-computing/355742/microsoft-launches-public-cloud-service-for-health-care
cloud computing

Microsoft launches public cloud service for health care

21 May 2020