• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

The exploitation of gaming engines: A new dimension in cybercrime

by CXO Staff
November 29, 2024
in Future, News, Tech

Check Point Research discovered a new technique using Godot Engine to execute malicious code that executes nefarious commands, delivers malware, and largely remains undetected

The exploitation of gaming engines: A new dimension in cybercrime

In the ever-evolving landscape of cyber threats, cybercriminals continually enhance their tactics to achieve higher infection rates and remain under the radar of cyber security systems. A recent discovery by Check Point Research has unveiled a chilling new trend that takes advantage of gaming engines, specifically their scripts. A popular open-source game engine, Godot Engine, has been exploited by threat actors to run malicious scripts called GodLoader and drop payloads, resulting in the infection of over 17,000 machines. This innovative technique enables attackers to carry out credential theft and deploy ransomware, posing significant risks to the 1.2 million users of Godot-developed games.

Here, we will describe how threat actors leverage Godot Engine, how the malware is distributed, and its potential to infect more players of Godot-developed games.

Understanding the Godot Gaming Engine

Godot Engine is an open-source game development platform revered for its flexibility and comprehensive toolset. Designed for creating both 2D and 3D games, it supports various export formats, facilitating the reach of developers to platforms such as Windows, macOS, Linux, Android, iOS, and HTML5. With a user-friendly interface and a Python-like scripting language called GDScript, Godot empowers developers of all levels. Additionally, its active community of over 2,700 contributors and 80,000 followers on social media highlights its popularity and dedicated support. However, this very appeal is now being exploited by cybercriminals.  

The GodLoader Technique

Threat actors have utilised Godot’s scripting capabilities to create custom loaders, called GodLoader, that remain undetected by many conventional security solutions. Since Godot’s architecture allows platform-agnostic payload delivery, attackers can easily deploy malicious code across Windows, Linux, and macOS, sometimes even exploring Android options. Additionally, the simplicity of GDScript, combined with Godot’s ability to integrate into various operating systems, enables attackers to bypass traditional detection methods.

Since June 29, 2024, a new technique utilising the malicious GodLoader has evaded detection by most antivirus tools, reportedly infecting more than 17,000 machines within three to four months.

Mechanism of Attack

The exploitation of the Godot Engine hinges on its use of .pck files, which bundle game assets, including scripts and scenes, for distribution. When these files are loaded, the malicious GDScript can be executed through the built-in callback function. This feature gives attackers many possibilities, from downloading additional malware to executing remote payloads—all while remaining undetected. Since GDScript is a fully functional language, threat actors have many functions like anti-sandbox, anti-virtual machine measures, and remote payload execution, enabling the malware to remain undetected. While the initial samples have targeted Windows systems, the cross-platform nature of Godot means that other operating systems could also be at risk.

Spreading GodLoader

The loader leverages the Stargazers Ghost Network, a sophisticated Distribution as a Service (DaaS) framework that masquerades malware delivery through seemingly legitimate GitHub repositories. From September to October 2024, GodLoader was distributed via 200 repositories, supported by over 225 Stargazer Ghost accounts that have artificially boosted the visibility of these malicious repositories by staring them. This approach creates an illusion of legitimacy, enticing unsuspecting developers and gamers to become victims.

The repositories were distributed and released into four separate waves, primarily targeting developers and gamers.

The Implications for Developers and Gamers

The implications of this new threat are substantial. With developers often accessing and utilising open-source platforms like Godot Engine for game development, the possibility of unwittingly incorporating malicious code into their projects becomes a credible concern. The risk is also heightened for gamers as they download and install games that may have been crafted with compromised tools.

Additionally, the threat actor behind this attack distributed GodLoader using Stargazers Ghost Network, demonstrating a high level of sophistication and success in its campaigns. The network exploits trust in open-source and legitimate software repositories to distribute malware discreetly. By masquerading as reputable applications or tools, the network attracts unsuspecting users who download and install what they believe to be safe software. This approach allows the malware to spread widely and rapidly, with thousands of users affected relatively quickly.

Employing a focused distribution strategy alongside a covert, undetectable method has significantly increased infection rates. This multi-platform technique boosts the malware’s adaptability, providing cybercriminals with a formidable resource that can seamlessly target various operating systems. As a result, attackers can deploy malware more efficiently across diverse devices, amplifying their reach and effectiveness.

Strengthening Cyber security: Navigating the Threat of GodLoader and Beyond

The GodLoader technique represents a significant step in the direction of more covert and sophisticated malicious activities. To reduce the risks of such threats, it’s essential to regularly update operating systems and applications with timely patches and other measures. Users should be wary of unexpected emails or messages that include links, especially from unknown sources while increasing cybersecurity awareness is vital to fostering a more alert and cautious culture. Finally, contacting security experts for questions or concerns can offer valuable insights and support in addressing possible security issues.

Check Point’s Threat Emulation and Harmony Endpoint provide protection against diverse attack methods, file types, and operating systems, such as this type of attack and malware families described in this report. Threat Emulation assesses files to detect malicious activity before they can breach an end user’s network, effectively uncovering unknown threats and zero-day vulnerabilities. When combined with Harmony Endpoint, which performs real-time file analysis, Threat Emulation evaluates each file, allowing users to quickly access a secure version while the original file undergoes a detailed examination. This proactive strategy not only enhances security by providing rapid access to safe content but also systematically identifies and addresses potential threats, thus preserving the integrity of the network.

Learn more about the malware, how it spreads, and the evasion techniques in Check Point Research’s technical analysis.

https://research.checkpoint.com/2024/the exploitation of gaming engines/

Protection

•         Technique.win.GDscript.*

Tags: CheckpointCybercimeCybersecurityGaming Engines
ShareTweet

Related Posts

ServiceNow introduces ServiceNow University
Business

ServiceNow introduces ServiceNow University

ServiceNow has introduced ServiceNow University, an innovative learner experience to empower individuals to grow, develop, and build skills that matter the most....

June 17, 2025
SentinelOne accelerates secure cloud migrations for AWS customers
Future

SentinelOne accelerates secure cloud migrations for AWS customers

SentinelOne announced that it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Workload Migration Programme, a programme...

June 16, 2025

Discussion about this post

Latest Issue

How the Middle East is becoming a global hub for experiential digital innovation

How the Middle East is becoming a global hub for experiential digital innovation

June 18, 2025
Omnix International launches HOT Systems professional laptops

Omnix International launches HOT Systems professional laptops

June 17, 2025
ServiceNow introduces ServiceNow University

ServiceNow introduces ServiceNow University

June 17, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.