- Track US election results on your iPhone, iPad or Apple Watch - here's how
- How to Become a Chief Information Officer: CIO Cheat Sheet
- 3 handy upgrades in MacOS 15.1 - especially if AI isn't your thing (like me)
- Your Android device is vulnerable to attack and Google's fix is imminent
- Microsoft's Copilot AI is coming to your Office apps - whether you like it or not
Minecraft Users Warned of Malware Targeting Modpacks
Minecraft gamers have been warned about a rapidly spreading multi-stage malware campaign targeting modpacks and plugins.
In a high alert warning posted at 18.00 BST on June 8, cybersecurity firm Bitdefender provided details on how infostealer malware named ‘Fractureiser’ is targeting users of the popular cross-platform game.
The researchers said that several CurseForge and Bukkit accounts have been compromised and used to publish malware-rigged updates of mods and plugins without the original author’s knowledge. These mods have then been included in popular modpacks “that have been downloaded several million times to date.”
Mods are user-created add-ons that extend the gameplay, collections of which are put together and configured in the form of modpacks. CurseForge and Bukkit are two of the largest Minecraft mod repositories.
Read more: Hackers, Fraudsters and Thieves – Understanding Cybersecurity in the Gaming Industry
The Fractureiser malware is downloaded in four stages, labelled zero through to three. Stage three brings the final payload in the form of a JAR file that includes a native binary named hook.dll.
It currently affects Linux and Windows Minecraft installs, and attempts to propagate itself to all JAR files on the system, including those that are not part of a Minecraft mod.
Upon modification of the file, the malware can target victims in a range of ways. Firstly, it can hijack cryptocurrency transactions by swapping wallet addresses with the attackers. Fractureiser can also steal cookies and user credentials from web browsers and exfiltrate authentication tokens for Discord, Microsoft and Minecraft.
Bitdefender highlighted “interesting behavior we believe is aimed at mod or plugin developers.” This is because stage three malware targets Windows Sandbox, the only virtualization environment that allows alteration of the host clipboard contents when the virtual machine is running in the background.
“We were able to confirm that dozens of mods and plugins have been rigged with the malware,” read the alert, adding “the overwhelming majority of victims are in the US.”
The company listed affected mods in its indicators of compromise section, and urged users who downloaded the infected mods to scan their JAR files.
Image credit: KateV28 /Shutterstock.com