Minecraft: Hackers Targeting Users via Malicious Mods

Minecraft Users Targeted by Criminals Posing as Mod Coders

Minecraft player looking at code, representing game modification risks

Beware of malicious software hidden in popular game modifications.

Minecraft users are facing a new threat as criminals hide sophisticated malware within game modifications. Discovered by cybersecurity experts, this malicious software was starkly described as a "digital verruca" that "buries itself into the machine," designed to stealthily steal sensitive data.

Minecraft, the wildly popular sandbox game with millions of users worldwide, is unfortunately becoming a new frontier for cybercriminals. Recent reports highlight a worrying trend where malicious actors are posing as legitimate game coders to distribute harmful software.

The Threat Uncovered: Malware on GitHub

According to cybersecurity firm Check Point, analysts have tracked two distinct pieces of malware being spread by what appear to be Russian-speaking gangs. These malicious tools were found circulating on GitHub, a widely used platform for sharing code.

Check Point researchers stated, "The malware is developed by a Russian-speaking threat actor and contains several artefacts written in the Russian language."

Thousands of unsuspecting Minecraft users have already fallen victim to this scheme. The malware is designed with a clear goal: to steal valuable information, including data from bank accounts, cryptocurrency wallets, web browsers, and other applications on a user's computer.

How the Attack Works

The hacking software is cleverly disguised within the code of Minecraft modifications, often referred to as "mods." These mods are popular tools that allow players to customize their gaming experience, adding new features, changing graphics, or even fixing bugs.

However, when players download and install the malicious code, they don't get the promised game enhancements. Instead, the malware lies dormant until the next time Minecraft is launched. Upon game load, the malicious code triggers and begins its invasive process.

Graeme Stewart, head of public sector at Check Point, explained that once triggered, "it will start actively stealing data." This includes sensitive personal and financial information:

  • Bank details (including cards saved in browsers)
  • Names and addresses
  • Emails
  • Data from cryptocurrency wallets accessed via browsers

Stewart likened the operation to "modern-day bank heist guys" who are "just in it for the money."

The "Digital Verruca"

Mr. Stewart used a vivid analogy to describe the insidious nature of the malware: "It's like a digital verruca, it buries itself into the machine and then starts sucking the information out." This highlights how the software embeds itself deep within the system, making it difficult to remove while it continuously extracts data.

Scope of the Problem

With around 200 million people playing Minecraft monthly, the potential attack surface is massive. Approximately one million of these players actively modify their game using code often found on platforms like GitHub.

In the UK alone, Ofcom estimates that 1.7 million gamers play Minecraft, putting a significant number of users at potential risk.

Responses and Warnings

Minecraft's spokesperson stated that player safety is a "top priority" and they are "committed to investigating reported security violations." They encourage players to report suspicious content and use official resources for guidance.

GitHub has also taken action, disabling user accounts found to be distributing the malicious code. They have teams dedicated to finding and removing harmful content, utilizing both AI and human review.

This type of gamer-targeted attack is becoming more common, prompting warnings from cybersecurity experts. The UK's National Cyber Security Centre (NCSC) has advised families to remain vigilant about potentially dangerous downloads.

Why Young Adults Are Particularly Vulnerable

Dr. Harjinder Lallie, a cyberattack academic at the University of Warwick, noted that while children are at risk, he is particularly concerned about young adults who have administrative rights on their computers.

"They're just a bit more savvy. They really want that mod; they want those extra features," Dr. Lallie explained. This eagerness can lead them to bypass security warnings, such as temporarily disabling antivirus software, to install a desired mod. "By that time, the damage has been done," he warns.

Stay safe online by being cautious about downloading third-party modifications and ensuring your security software is always active and up-to-date. For more tips on staying secure online, you can check out resources from the National Cyber Security Centre.

Learn more about protecting yourself from online threats in our guide to digital safety.

Comments