A newly discovered malware, dubbed GodLoader, is raising alarms in the cybersecurity community for its ability to stealthily infect devices across multiple operating systems, including Windows, macOS, Linux, Android, and iOS.
Unveiled by Check Point Research, this advanced malware exploits the Godot Engine, a popular open-source game development platform, to execute malicious scripts while bypassing most antivirus detection systems.
GodLoader leverages the Godot Engine’s scripting language, GDScript, to deliver and execute malicious payloads. GDScript is a Python-like language designed for game development, enabling developers to create dynamic content. However, cybercriminals have weaponized their flexibility to craft scripts that trigger malicious commands.
The malware is distributed via the Stargazers Ghost Network, a sophisticated “Malware-as-a-Service” operation hosted on GitHub. Over 200 repositories and 225 accounts were used to distribute GodLoader between September and October 2024.
These repositories masqueraded as legitimate projects, gaining credibility through GitHub’s “starring” system to deceive users.
Once downloaded, GodLoader executes its payload by embedding or dynamically loading malicious .pck
files (used by Godot to bundle game assets), Checkpoint researchers said.
Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.
These files contain encrypted GDScripts that are decrypted and executed by the engine. The malware also employs advanced evasion techniques, such as anti-sandboxing and anti-virtual machine checks, to avoid detection.
GodLoader Cross-Platform Capabilities
One of GodLoader’s most concerning features is its cross-platform functionality. The Godot Engine allows developers to export projects to various platforms with minimal modifications. Threat actors have exploited this capability to target:
- Windows: Initial samples demonstrated payload delivery on Windows devices.
- macOS and Linux: Proof-of-concept attacks showed similar techniques could be applied with minor adjustments.
- Android: Although not yet fully developed, researchers believe an Android version is feasible.
- iOS: Deployment on iOS faces challenges due to Apple’s strict App Store policies but remains a potential risk.
This versatility makes GodLoader a powerful tool for attackers aiming to maximize their reach across diverse operating systems.
The Stargazers Ghost Network has played a crucial role in distributing GodLoader. Between June and October 2024, the network launched multiple campaigns using GitHub repositories to host malicious files. These repositories were updated regularly using automated bots to appear legitimate and attract unsuspecting users.
The malware’s infection chain begins with downloading a seemingly harmless archive containing executable files and .pck
resources. Once executed, the malware decrypts the .pck
file, runs malicious GDScripts, and downloads additional payloads from external servers. Notably, these payloads included cryptocurrency miners like XMRig and credential-stealing malware such as RedLine.
GodLoader poses a significant threat due to its ability to exploit legitimate software like the Godot Engine. With over 1.2 million users of Godot-developed games potentially at risk, attackers could target gamers by replacing legitimate .pck
files with malicious ones or distributing infected game mods.
Moreover, the malware’s ability to remain undetected by most antivirus engines amplifies its danger. For example, Check Point researchers found that some infected archives had been downloaded over 17,000 times without triggering any security alerts.
Mitigation Strategies
To protect against threats like GodLoader:
- Regularly update operating systems and applications.
- Avoid downloading software from unverified sources.
- Use robust endpoint protection solutions capable of detecting advanced threats.
- Educate employees and users about phishing tactics and suspicious downloads.
- Developers using the Godot Engine should encrypt
.pck
files with asymmetric encryption methods to prevent tampering.
GodLoader represents a new frontier in cross-platform malware development, exploiting trust in open-source tools like the Godot Engine. Its stealthy distribution methods and advanced evasion techniques highlight the growing sophistication of cyber threats.
As attackers continue innovating, vigilance and proactive security measures are essential to mitigate risks posed by such multi-platform malware.
Indicators of Compromise
Description | Value |
---|---|
Archive distributed by Stargazers Ghost Network | 260f06f0c6c1544afcdd9a380a114489ebdd041b846b68703158e207b7c983d6 |
Launcherkks.exe | 3317b8e19e19218e5a7c77a47a76f36e37319f383b314b30179b837e46c87c45 |
Launcherkks.pck | 0d03c7c6335e06c45dd810fba6c52cdb9eafe02111da897696b83811bff0be92 |
RedLine | 604fa32b76dbe266da3979b7a49e3100301da56f0b58c13041ab5febe55354d2 6be9c015c82645a448831d9dc8fcae4360228f76dff000953a76e3bf203d3ec8 |
XMRig | b1a351ee61443b8558934dca6b2fa9efb0a6d2d18bae61ace5a761596604dbfa |
RedLine C&Cs | 147.45.44.83:6483 185.196.9.26:6302 |
Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar
The post New Stealthy GodLoader Malware Attacking Windows, macOS, Linux, Android, & iOS Devices appeared first on Cyber Security News.