Malware

Activision warns of Call of Duty Cheat tool used to deliver RAT

The popular video game publisher Activision is warning gamers that threat actors are actively disguising a remote-access trojan (RAT) in Duty Cheat cheat tool.

Activision, the company behind Call of Duty: Warzone and Guitar Hero series, is warning gamers that a threat actor is advertising cheat tools that deliver remote-access trojan (RAT).

The company reported that in March of 2020 a threat actor posted on multiple hacking forums advertising a free, “newbie friendly” and effective method for spreading a RAT by tricking victims to disable their protections to install a
video game cheat.

“It is common practice when configuring a cheat program to run it the with the highest
system privileges. Guides for cheats will typically ask users to disable or uninstall antivirus software and host
firewalls, disable kernel code signing, etc.” reads the report published by Activision.

The ads published by the actor received ten thousand views and the actor also shared a file needed to set up the fake cheat used to distribute malware tracked by the experts as “COD-Dropper v0.1”..

In December 2020, threat actor included the dropper in a tutorial aimed at ‘noobies’ looking to make some easy money.”

On March 1st, the threat actor published a YouTube video advertising the COD Warzone 2020 as an “undetected” cheat and providing detailed instructions on how to use it.

Source Activision

The comments to the video show that people tried the cheat tool.

Once installed the malware, the attackers have full access to the victim’s system, it could be used to drop additional payloads. The attacks observed by Activision used a .NET app dropper that once downloaded will ask the victim to grant admin privileges to install the malicious cheat tool.

“Once the payload has been saved to disk, the application creates a VBScript named ‘CheatEngine.vbs’. It then
starts the ‘CheatEngine.exe’ process and deletes the ‘CheatEngine.exe’ executable.” continues the report.

“It then starts the ‘CheatEngine.exe’ process and deletes the ‘CheatEngine.exe’ executable. The creator/generator is a .NET executable that contains the dropper .NET executable as a resource object.”

The creator/generator is a .NET executable that contains the dropper .NET. Upon clicking on ‘:: Build ::’, the application will inspect the ‘COD_bin’ object with the ‘dnlib’ .NET assembly library, then replaces the URL placeholder named ‘[[URL]]’ with the provided URL that point to the malicious payload and saves the ‘COD_bin’ resource under a new filename.

“When it comes down to it, the dependencies for a “genuine” cheat to work are the same as those needed by
most malware tools to successfully execute. System protections need to be bypassed or disabled, and privileges
need to be escalated to allow the program to run correctly and/or establish persistence.” concludes the report that includes IoCs. “While this method is rather simplistic, it is ultimately a social engineering technique that leverages the willingness of its target (players that want to cheat) to voluntarily lower their security protections and ignore warnings about running potentially malicious software.”

If you want to receive the weekly Security Affairs Newsletter for free subscribe here.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Call of Duty cheat tool)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FIN7 targeted a large U.S. carmaker phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

7 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

12 hours ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

14 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

1 day ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

1 day ago

This website uses cookies.