Article Details
Scrape Timestamp (UTC): 2025-06-18 21:10:40.271
Source: https://www.theregister.com/2025/06/18/minecraft_mod_malware/
Original Article Text
Click to Toggle View
Minecraft cheaters never win ... but they may get malware. Infostealers posing as popular cheat tools are cropping up on GitHub. Trojanized Minecraft cheat tools hosted on GitHub have secretly installed stealers that siphon credentials, crypto wallets, and other sensitive data when executed by players. According to Check Point Research, which spotted the Minecraft mod malware, about 500 GitHub repositories were part of this operation targeting gamers and about 70 accounts gave the malicious repos 700 stars. Upwards of 1,500 devices may have been infected to date. Considering the video game's popularity — Minecraft has more than 200 million monthly active players — the potential for data theft is huge. This campaign has been active since March, and the researchers attribute it to Russian-speaking malware developers operating as part of the so-called Stargazers Ghost Network — a network of GitHub accounts that distribute malware and malicious links through malicious repositories. The malware purports to be popular cheat tools like Oringo and Taunahi, and once executed, kicks off a multi-stage attack with the first two written in Java and requiring Minecraft to be pre-installed on the victim's device. The first-stage malware loader, a malicious JAR mod, runs at game launch and uses anti-VM and anti-analysis checks to spot and abort in sandbox environments, ensuring it only proceeds on a real victim's machine. Assuming the loader passes these and other environment checks, it then loads the second stage: stealer malware that swipes users' Minecraft tokens and Microsoft account info, as well as Discord tokens and Telegram data. This second-stage payload also downloads and executes the final stealer, written in .NET, and exfiltrating it to a Discord webhook, which allows the malware to send the stolen info to a Discord channel. The final malware harvests credentials from Firefox and Chromium-based web browsers, as well as cryptocurrency wallets (Armory, AtomicWallet, BitcoinCore, Bytecoin, DashCore, Electrum, Ethereum, LitecoinCore, Monero, Exodus, Zcash, Jaxx), VPNs (ProtonVPN, OpenVPN, NordVPN), and applications including Steam, Discord, FileZilla and Telegram. It also collects information about the infected machine and captures screenshots before sending all of this data to the attackers' Discord server. While these kinds of attacks are reprehensible, it's also a good reminder for the kids: Cheaters never win.
Daily Brief Summary
Researchers from Check Point uncovered a malware campaign disguising as Minecraft cheat tools on GitHub.
Around 500 GitHub repositories were involved in distributing these Trojanized tools, which have affected over 1,500 devices so far.
These malicious mods are linked to Russian-speaking malware developers part of the Stargazers Ghost Network.
The malware conducts a multi-stage attack, starting with a Java-based loader that checks for a genuine environment, avoiding sandboxes and VMs.
Subsequent stages of the malware steal Minecraft and Microsoft account credentials, as well as data from applications like Discord and Telegram.
The final malware stage targets web browser credentials, cryptocurrency wallets, VPN configurations, and extensively collects data from the infected machine.
This incident highlights the significant risks of downloading and using unofficial or pirated game mods and tools.