Story image

Cybercriminals caught targeting gamers with sneaky malware

08 Sep 17

​ESET researchers have revealed a new sinister malware that is targeting gamers around the world.

Labelled Joao, the malware is spread via hacked Aeria games that are offered on unofficial websites. The malware is then able to download and install virtually any other malicious code on the victim’s computer.

"To spread their malware, the attackers behind Joao have misused massively-multiplayer online role-playing games (MMORPGs) originally published by Aeria Games,” says ESET malware analyst, Tomáš Gardoñ.

“Our research has shown that several other Aeria games have been misused in the same way in the past, however, their corresponding unofficial websites have either gone inactive or had the malicious downloads removed in the meantime.”

ESET has blocked the website that is serving Joao malware and let Aeria Games know about the infringement.

In terms of how it works, ESET says the affected games are then modified to run Joao’s malicious componentry which means when the game launcher is run, so too is Joao.

“Upon launching, the Joao downloader first sends basic information about the infected computer – device name, OS version and information on user privileges – to the attacker’s server because the malware keeps its operations “silent” and since the game works as expected, there’s nothing suspicious about the whole infection process from the user’s point of view,” says Gardoñ.

“Compared to downloading and launching a legitimate Aeria game, the only visible difference is an extra .dll file in the game’s installation folder.”

ESET revealed the Joao components they discovered during their research had backdoor, spying, and DDoS capabilities.

Now, ESET says if you’re one of those or you know someone who does download lots of games from different sources and unsure if this news applies to you, there is a quick and easy way to see if Joao malware is lurking on your computer.

Simply run a search on your computer for “mskdbe.dll” – if you get a hit, then it’s likely your computer has been infected.

However, if no such file is found then you’re not out of the woods just yet as the cybercriminals can rename the file at any moment.

For that reason, ESET recommends using a cybersecurity solution that can detect the threat and remove it for you.

What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Bitdefender announces security integration with Kaseya
The new partnership will allow VSA by Kaseya’s cloud and on-premises users to deploy and manage security with Bitdefender Cloud Security for MSPs.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.