The Rise of Lua-Based Malware Targeting Gamers: A Growing Threat

 


Introduction

In the ever-evolving world of cyber threats, malicious actors are increasingly targeting specific communities to spread malware. One such vulnerable group is the gaming community, particularly users searching for cheats and hacking tools. Recently, a new wave of attacks has surfaced, exploiting the popularity of Lua, a scripting language commonly used in game development. These malicious campaigns trick users into downloading malware disguised as game cheat tools, which can persist on infected systems and deliver harmful payloads.

Malware Targeting Gamers Through Lua Scripts

A recent investigation revealed that cybercriminals are capitalizing on the Lua gaming engine, which is widely used by gamers, especially students, across the globe. According to Shmuel Uzan, a researcher at Morphisec, this new malware strain is highly active in various regions, including North America, Europe, Asia, and even Australia. The malware, which targets users seeking game cheats, poses a significant threat due to its ability to establish a foothold on the infected system and deliver additional payloads over time.

The campaign was first identified in March 2024 by OALabs. The malware loader, written in Lua, was distributed by exploiting a quirk on GitHub, allowing the malicious actors to stage and deliver harmful payloads through GitHub repositories. The threat actors utilized this platform to host malware-loaded ZIP archives, enticing unsuspecting users to download them under the guise of cheat tools.

GitHub and Microsoft's Response
As the malicious activity gained traction, companies like GitHub and Microsoft stepped in to address the threat. GitHub, in particular, responded by disabling user accounts and removing content that violated their Acceptable Use Policies. These actions were aimed at curbing the distribution of malware through their platform. According to a statement made to The Hacker News, GitHub continues to enhance its security measures to protect users from such activities.

Morphisec’s Findings on the Malware’s Evolution
Morphisec’s research into the malware revealed a subtle shift in its delivery mechanism. To avoid detection, the malware is now frequently delivered through obfuscated Lua scripts rather than compiled Lua bytecode, which can easily raise suspicion. However, the overall infection process remains the same. Gamers searching for popular cheat engines like Solara and Electron on Google are directed to fake websites that host booby-trapped ZIP files.

The malicious ZIP files contain four key components: a Lua compiler, a Lua runtime interpreter DLL, an obfuscated Lua script, and a batch file. When executed, the batch file runs the Lua script, which communicates with a command-and-control (C2) server. This server then issues commands to maintain the malware’s presence on the system, hide processes, or download additional payloads like Redone Stealer or CypherIT Loader.

The Rise of Infostealers and Cryptocurrency Miners
A major concern with this campaign is the rise of information-stealing malware. Infostealers like RedLine have become increasingly popular among cybercriminals due to their ability to harvest user credentials, which are then sold on the dark web. These stolen credentials often end up in the hands of more sophisticated threat actors, who use them in further attacks.

Adding to the concern is the spread of cryptocurrency miners, which target users looking for pirated software. Kaspersky recently reported that a campaign involving an open-source miner called SilentCryptoMiner has been infecting users across Russia, Belarus, India, and other countries. This malware not only mines cryptocurrency without the user’s knowledge but can also perform other malicious tasks, such as replacing cryptocurrency wallet addresses and capturing screenshots.

Conclusion
The gaming community, particularly users seeking cheat tools, has become a significant target for cybercriminals. By exploiting the popularity of Lua scripts and game engine add-ons, these attackers have found new ways to distribute harmful payloads. As the malware continues to evolve, with tactics like obfuscation and the use of trusted platforms like GitHub, it is more critical than ever for users to exercise caution when downloading cheats or tools from unverified sources. Moreover, platforms like GitHub must continue to enhance their security measures to combat these threats effectively.

Post a Comment

0 Comments