Cryptominer hidden in pirated games lands mostly on Russian computers

Avatar

Suspected Russian-speaking hackers are using malicious versions of popular pirated games to install cryptomining software known as XMRig on their victims’ devices, researchers have found.

The attacks, conducted by a previously unidentified threat actor, mostly affected users in Russia, with additional cases observed in Belarus, Kazakhstan, Germany, and Brazil, according to a new report by Russian cybersecurity firm Kaspersky.

Malicious versions of games such as BeamNG.drive, Garry’s Mod, Dyson Sphere Program, Universe Sandbox and Plutocracy were hosted on torrent sites, which are often used for the illegal sharing of copyrighted content like movies, music, software and games.

Gamers in Russia are particularly vulnerable to such attacks due to the high rate of piracy in the country. Russian torrent sites like RuTracker are widely used to pirate movies, TV shows, games, and music. After Western companies withdrew from Russia following its invasion of Ukraine in 2022, pirated versions of films and games became even more prevalent.

As part of the campaign discovered by Kaspersky, the hackers delivered open-source cryptocurrency mining software XMRig to their victims via popular simulator and open-world games that require minimal disk space.

These malicious releases were created in advance and uploaded around September 2024. Although the trojanized games were published by different authors, they were all cracked in the same way, researchers said.

Outside of cryptominers like XMRig, pirated games can also be tainted with other malware tied to cybercrime, such as botnets used for distributed denial-of-service (DDoS) attacks and spam campaigns.

XMRig can be legitimately used to mine cryptocurrency, primarily Monero, but it has been widely abused by cybercriminals, who are consistently devising new methods to deliver the installer to victims’ devices. In one campaign, they used pirated versions of the video editing software Final Cut Pro to install the cryptominer on Apple computers.

The campaign discovered by Kaspersky was launched on New Year’s Eve, as criminals likely tried to exploit reduced vigilance and increased torrent traffic during the holiday season, researchers said. The attacks lasted for a month and affected both individuals and businesses, where the hackers compromised computers inside corporate infrastructures.

Before infecting the targeted devices, the hackers used tools that checked for antivirus software and, if detected, terminated the malware execution. To deliver the miner implant, the actors implemented “a sophisticated execution chain”  making use of powerful gaming machines capable of sustaining mining activity, researchers said.

There are no clear links between this campaign and any previously known threat actors, making attribution difficult, according to Kaspersky. However, the use of the Russian language suggests the campaign may have been developed by a Russian-speaking actor.

Earlier in September, researchers from Russian cybersecurity firm F.A.C.C.T. discovered a campaign where hackers attempted to deliver XMRig to workers at Russian tech companies, retail marketplaces, insurance firms, and financial businesses through malicious email auto-replies.

MalwareNewsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DOGE access to Social Security, IRS data could create privacy and security risks, experts say

Next Post

China-linked hackers target European healthcare orgs in suspected espionage campaign

Related Posts

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word Expo, which is scheduled to kick off in
Avatar
Read More

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts

Cybersecurity researchers have discovered a malvertising campaign that's targeting Microsoft advertisers with bogus Google ads that aim to take them to phishing pages that are capable of harvesting their credentials. "These malicious ads, appearing on Google Search, are designed to steal the login information of users trying to access Microsoft's advertising platform," Jérôme Segura, senior
Avatar
Read More