Hackers target gamers with a supply-chain attack
Cyber criminals have compromised an Android emulator and used it to infect gamers’ devices with malware
Security researchers have discovered hackers have compromised an Android emulator and used it to infect gamers’ devices with malware.
According to researchers at ESET, a new supply-chain attack compromising the update mechanism of NoxPlayer, an Android emulator that helps 150 million users worldwide play mobile games on their PCs and Macs, was discovered late last month.
Currently, the supply-chain attack has infected gamers in Asia with three malware strains. There is no sign of hackers using the malware for financial gain, but researchers have discovered hackers are using the malware for surveillance.
The company behind NoxPlayer is Hong Kong-based BigNox, and NightScout is the cyber criminal group initiating the attacks. Security researchers said hackers compromised BigNox's res06.bignox.com storage servers and abused the api.bignox.com API infrastructure to install payloads.
As of this writing, BigNox has denied being affected by the intrusion.
Researchers discovered indicators of compromise in September 2020, but it wasn’t until January 25 that they uncovered explicitly malicious activity. They immediately reported the malicious activity to BigNox.
“We have sufficient evidence to state that the BigNox infrastructure (res06.bignox.com) was compromised to host malware, and to suggest that their HTTP API infrastructure (api.bignox.com) could have been compromised. In some cases, additional payloads were downloaded by the BigNox updater from attacker-controlled servers,” researchers said.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
According to further investigations, researchers said that out of the 100,000 of its users that also had NoxPlayer installed, only five received a malicious update. They said this showed that “Operation NightScout” as they called it, was a “highly targeted operation.”
Victims are based in Taiwan, Hong Kong, and Sri Lanka. Researchers have not yet found any evidence of affected gamers in the US.
“We were unsuccessful in finding correlations that would suggest any relationships among victims. However, based on the compromised software in question and the delivered malware exhibiting surveillance capabilities, we believe this may indicate the intent of collecting intelligence on targets somehow involved in the gaming community,” said researchers.
Researchers said that gamers should “perform a standard reinstall from clean media” in case of intrusion.
“For non-compromised users: do not download any updates until BigNox notifies that it has mitigated the threat,” added researchers.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.