Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

The Department of Justice challenges Kentucky registrations that allow in-state tuition fees for undocumented students

Russia’s Answer to ChatGPT? Sberbank’s Reasoning LLM is Coming 

According to JPMorgan, how does oil react when we bomb Iran?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Over 1,500 Minecraft players infected with Java malware pretending to be game mods on GitHub
Identity

Over 1,500 Minecraft players infected with Java malware pretending to be game mods on GitHub

userBy userJune 18, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Minecraft player

The new multi-stage malware campaign targets Minecraft users using Java-based malware that employs distribution as a service (DAAS) offerings called Stargazers Ghost Network.

“The campaign has created a multi-stage attack chain that specifically targets Minecraft users,” Checkpoint researchers Jaromírhochejší and Antonis Terefos said in a report shared with Hacker News.

“Malware was spoofing Oringo and Taunahi, the ‘Scripts and Macro Tools’ (also known as cheats).’ The first and second stages are developed in Java and can only be run if the Minecraft runtime is installed on the host machine. ”

The ultimate goal of the attack is to trick players into downloading Minecraft mods from Github and delivering a .NET information steeler with comprehensive data theft. The campaign was first detected by a cybersecurity company in March 2025.

What makes the activity stand out is the use of an illegal product called Stargazers Ghost Network. It uses thousands of Github accounts to set up contaminated repositories pose as cracked software and gaming cheats.

Cybersecurity

These malicious repositories, pretending to be Minecraft mods, act as conduits that infect popular video game users with Java loaders (for example, “Oringo-1.8.9.jar”).

Java Archives (JAR) files are implemented to avoid simple anti-VM and anti-analytic techniques to detect them. Their main purpose is to download and run another JAR file, a two-stage steeler that gets and runs a .NET steeler as the final payload when the game is started by the victim.

The second stage component is taken from the IP address (“147.45.79.104”) stored in the Paste Pebin in Base64 encoding format, and essentially converts the Paste Tool to a Dead Drop Resolver.

“To add mods to a Minecraft game, users will need to copy the malicious JAR archive to the Minecraft Mods folder. When you start the game, the Minecraft process will load all the mods from the folder containing the malicious mods that you want to download and run the second stage,” the researchers said.

In addition to downloading .NET Steelers, the second stage steelers are equipped to steal discord and Minecraft tokens as well as Telegram-related data. Meanwhile, .NET Steelers can collect various web browsers and files, as well as information from cryptocurrency wallets and other apps such as Steam and Filezilla.

You can also take screenshots and accumulate information related to the execution process, the external IP address of the system, and the contents of the clipboard. The captured information is eventually bundled and sent to the attacker via a Discord webhook.

The campaign is suspected to be the job of a threat actor who speaks Russian, due to the presence of several artifacts written in Russian and the time zone of attacker commits (UTC+03:00). It is estimated that more than 1,500 devices may have fallen prey to this scheme.

“This case highlights how popular gaming communities can be used as vectors that are effective in the distribution of malware, and highlights the importance of attention when downloading third-party content,” the researchers said.

“Stargazers Ghost Network is actively distributing this malware and targeting Minecraft players for mods to enhance gameplay. In fact, what appeared to be a harmless download was actually a Java-based loader that deployed two additional stolen items that ruled out credentials and other sensitive data.”

A new variation of Kim Jong Jurat Steeler has been detected

The development comes when Palo Alto Networks Unit 42 details two new variants of information stolen goods called the codename Kimjongrat, which is likely to be linked to the same North Korean threat actor behind Babyshark and the stolen pencil. Kim Jong Rats were detected in the wild by May 2013 and provided as a secondary payload in Babyshark attacks.

Cybersecurity

“One new variation uses portable executable (PE) files, while the other uses a PowerShell implementation,” said security researcher Dominik Reichel. “The PE and PowerShell variants are both started by clicking on the Windows Shortcut (LNK) file that downloads the Dropper file from an Attacker Controlled Content Delivery Network (CDN) account.”

The PE variant Dropper extracts loaders, decoy PDFs, and text files, while the PowerShell variant Dropper extracts decoy PDF files along with the ZIP archive. The loader downloads an auxiliary payload containing the steeler component of Kim Jong Rat.

The ZIP archive delivered by PowerShell Variant’s Dropper includes scripts that embed Kimjongrat Powershell-based steeler and keylogger components.

Both new incarnations can collect and transfer browser data such as victim information, files matching a particular extension, and credentials and details from the Cryptocurrency Wallet extension. Kimjongrat’s PE variant is designed to harvest FTP and send client information via email.

“Kim Jong Rat’s continued development and deployment features changing techniques such as using legitimate CDN servers to hide its distribution, indicating a clear and continuous threat,” Unit 42 said. “This adaptability not only shows the persistent threat posed by such malware, it also highlights the developer’s commitment to updating and expanding its functionality.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePro-Israel hackers will destroy $90 million with Iranian code, the company says
Next Article Hackers steal and destroy millions of Iran’s biggest crypto exchanges
user
  • Website

Related Posts

New malware campaign uses CloudFlare tunnels to deliver mice through phishing chains

June 18, 2025

FedRamp at Startup Speed: Lessons Learned

June 18, 2025

Water Curse employs 76 GitHub accounts to provide multi-stage malware campaigns

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Department of Justice challenges Kentucky registrations that allow in-state tuition fees for undocumented students

Russia’s Answer to ChatGPT? Sberbank’s Reasoning LLM is Coming 

According to JPMorgan, how does oil react when we bomb Iran?

DOJ seizes a record $225 million code tied to fraud

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Russia’s Answer to ChatGPT? Sberbank’s Reasoning LLM is Coming 

Bitvault raises $2 million from GSR, Gemini and Auros and launches BTC-backed money

Typedef emerges from stealth for $5.5 million to turn AI prototypes into production grade pipelines

Nvidia-backed Sandboxaq accelerates drug discovery by launching AI molecular datasets

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.