
#POINT BLANK GAME CODE#
“It seems that certain videogame companies picked up this available code and started making their own versions of the game.”Īs did malware developers - so far, Kaspersky Lab researchers said that they have found at least three weaponized samples of Infestation signed by unrevoked, legitimate signatures belonging to Electronics Extreme.

After a 2013 compromise of its game servers, “the game source code was most probably stolen and released to the public,” researchers said. The certificate was still unrevoked as at early April, according to Kaspersky Lab, although Zepetto seems to have stopped using the certificate at the end of February 2019.Īnother victim is a zombie survival game called Infestation: Survivor Stories (a.k.a The War Z), developed by Electronics Extreme, a gaming company from Thailand. The files are signed with a legitimate, unrevoked certificate developed by the South Korean company behind the game, Zepetto Co.

It found that several executable files for installing Point Blank have been injected with a backdoor. Kaspersky Lab released additional details on the attacks this week, linking them to the recent ASUS supply-chain offensive. “Given the popularity of the compromised application that is still being distributed by its developer, it wouldn’t be surprising if the number of victims is in the tens or hundreds of thousands,” the firm said in an initial writeup, referring to Point Blank.
#POINT BLANK GAME UPDATE#
This is the same modus operandi seen in Operation ShadowHammer, where more than a million ASUS computer owners worldwide were infected by a backdoor that was delivered inside the legitimate ASUS Live Update Utility (an issue that is now fixed).ĮSET, which did a cursory overview of the gaming attacks in March (without naming the affected games), noted that its telemetry shows victims are mostly located in Asia, with Thailand having the largest part of the pie. So, gaming aficionados that think they’re downloading a cool first-person shooter could instead find themselves as the quarry in a different kind of attack. They’re also signed with legitimate digital certificates that adversaries have managed to abuse, which allows the files to skate past antivirus and onto the desktop. Researchers at Kaspersky Lab and ESET have spotted downloads of the affected games that have had backdoors inserted into them. Victims include fans of the popular first-person shooter game, Point Blank.

Researchers have found similar digitally-signed binaries using the videogame industry as a delivery conduit for malware. The focus of the APT behind the ShadowHammer supply-chain attack that abused the ASUS computer update function turns out to be wider in scope than previously thought.
