A large-scale malware campaign dubbed "StaryDobry" has been targeting gamers worldwide with trojanized versions of cracked games, spreading a sophisticated cryptomining malware that exploits users seeking free game downloads.
The campaign, which began in late December 2024 and lasted approximately one month, primarily impacted users in Russia, Brazil, Germany, Belarus, and Kazakhstan. Cybersecurity researchers discovered that threat actors strategically uploaded infected game installers onto torrent sites in September 2024, months before triggering the payloads during the holiday season.
Popular games like BeamNG.drive, Garry's Mod, Dyson Sphere Program, Universe Sandbox, and Plutocracy were among the titles used to distribute the malicious installers. The trojanized game packages appeared normal and included the actual game, but also contained hidden malicious code designed to infect users' systems.
The infection chain involves a multi-stage process that ultimately deploys an XMRig cryptocurrency miner. When users download and install the infected game, a malware dropper (unrar.dll) is unpacked and launched in the background, performing extensive anti-debugging checks to avoid detection.
The malware demonstrates highly evasive behavior, collecting detailed system information including OS version, country, CPU, RAM, and GPU details. It then sends this information to a command and control (C2) server and proceeds to install a malware loader that poses as a legitimate Windows system file.
If the infected machine has at least eight CPU cores, the malware downloads and runs a modified XMRig miner. The miner maintains a separate thread continuously monitoring for security tools, shutting itself down if any process monitoring applications are detected.
Cybersecurity researchers from Kaspersky noted that while they cannot definitively attribute the attacks to a specific threat group, the use of Russian language in the code suggests the campaign likely originates from a Russian-speaking actor.
"StaryDobry tends to be a one-shot campaign," Kaspersky researchers concluded. "By targeting powerful gaming machines capable of sustained mining activity, the threat actors implemented a sophisticated execution chain that exploited users seeking free games."
Users are advised to only download games from official sources and maintain up-to-date antivirus protection to prevent such infections.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles: Here are the 5 most contextually relevant blog posts:
Ultralytics YOLO AI Model Compromised by Cryptomining Supply Chain Attack
GodLoader Malware Emerges as Gaming Threat Through Godot Engine Targeting Thousands
New Malware Threatens Industrial Engineering Workstations with Process Termination
Hackers Exploit Fake CAPTCHA to Spread Lumma Stealer Globally
AppLite Banking Trojan Targets Job Seekers Through Malicious Phishing Emails
Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.