Hackers target game developers with advanced malware

Hack enabled Winnti to compromise build systems and steal in-game currencies

Researchers from the Slovakian security company ESET have attributed a recent hack that infected several Massively Multiplayer Online (MMO) game makers to Winnti, a hacking group that has been active since as early as 2012. Previous targets of the group have included Chinese journalists, the Taiwanese government and many tech organizations. Most recently, though, the group has taken aim at game developers, pushing malware-filled apps in hopes of stealing in-game currencies.

In a post published Thursday morning, ESET detailed its discovery of a new, modular backdoor it calls PipeMon. Designed to function as a print processor, Winnti used the backdoor against multiple video gaming companies based in South Korea and Taiwan that develop MMO-style games. 

ESET found that, in one case, Winnti was able to compromise a victim’s entire build system using PipeMon. In doing so, Winnti made it possible for threat actors to trojanize game executables. In another case identified by ESET, compromised game servers allowed hackers to manipulate in-game currencies for financial gain.

Multiple factors led ESET them to attribute this most recent hacking campaign to Winnti. Not did PipeMon use some of the same domains as previous Winnti campaigns, but Winnti malware had already been found at some of the companies compromised by the PipeMon attacks. 

Active since at least 2012, Winnti is responsible for a number of high-profile supply-chain attacks against the software industry. Many of these attacks have led to the inconvenient distribution of trojanized software the group uses to compromise additional unsuspecting victims. Before PipeMon, ESET says Winnti’s most recent attacks included leveraging a ShadowPad backdoor to target two Hong Kong universities.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Organizations warned of ransomware risk from smaller operators
ransomware

Organizations warned of ransomware risk from smaller operators

19 Oct 2021
Iranian hacking group continues to target US citizens
hacking

Iranian hacking group continues to target US citizens

18 Oct 2021
MirrorBlast phishing campaign targets financial companies
phishing

MirrorBlast phishing campaign targets financial companies

15 Oct 2021
Kaspersky exposes MysterySnail zero-day exploit in Windows
zero-day exploit

Kaspersky exposes MysterySnail zero-day exploit in Windows

13 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021