www.vice.com Open in urlscan Pro
151.101.193.132  Public Scan

URL: https://www.vice.com/en/article/y3p35w/hackers-are-using-anti-cheat-in-genshin-impact-to-ransom-victims
Submission: On September 21 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

<form><label class="sr-only" for="search-bar__input">Input for searching articles, videos, shows</label><input type="text" id="search-bar__input" role="searchbox" value="" placeholder="Search articles, videos, shows" required=""><button type="submit"
    role="button" aria-label="Search" class="nav-bar__search-bar__button"><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">
      <path fill-rule="evenodd" clip-rule="evenodd"
        d="M6.55892 10.7328C8.86408 10.7328 10.7328 8.86408 10.7328 6.55892C10.7328 4.25376 8.86408 2.38506 6.55892 2.38506C4.25376 2.38506 2.38506 4.25376 2.38506 6.55892C2.38506 8.86408 4.25376 10.7328 6.55892 10.7328ZM6.55892 13.1178C10.1813 13.1178 13.1178 10.1813 13.1178 6.55892C13.1178 2.93653 10.1813 0 6.55892 0C2.93653 0 0 2.93653 0 6.55892C0 10.1813 2.93653 13.1178 6.55892 13.1178Z"
        fill="white"></path>
      <path fill-rule="evenodd" clip-rule="evenodd" d="M14.5219 15.9015C14.3906 16.0328 14.1777 16.0328 14.0464 15.9015L9.18249 11.0376L11.0376 9.18249L15.9015 14.0464C16.0328 14.1777 16.0328 14.3906 15.9015 14.5219L14.5219 15.9015Z" fill="white">
      </path>
    </svg></button></form>

<form class="user-newsletter__form" novalidate="">
  <div class="user-newsletter__form__wrap"><input type="email" name="email" id="email" class="user-newsletter__form__input" value="" placeholder="Your email address"><label class="user-newsletter__form__label" for="email">Your Email:</label> </div>
  <button aria-label="newsletter submit button" type="submit" class="vice-button vice-button--black user-newsletter__submit">Subscribe</button>
</form>

Text Content

Advertisement


Sign InCreate Account
+ English


VICE
 * Video
 * TV
 * News
 * Tech
 * Rec Room
 * Food
 * World News
 * The 8:46 Project
 * Games
 * Music
 * Health
 * Money
 * Drugs
 * Identity
 * Entertainment
 * Environment
 * Travel
 * Horoscopes
 * Sex
 * VICE Magazine
 * The Gender Spectrum Collection

VICE
 * 
 * 
 * 

Sign InCreate Account
 * Video
 * TV
 * Podcasts
 * Apps
 * VICE Voices
 * Newsletters
 * Rec Room

Input for searching articles, videos, shows
 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * News
 * Tech
 * Rec Room
 * Food
 * World News
 * The 8:46 Project
 * Games
 * Music
 * Health
 * Money
 * Drugs
 * Identity
 * Entertainment
 * Environment
 * Travel
 * Horoscopes
 * Sex
 * VICE Magazine
 * The Gender Spectrum Collection

 * About
 * Jobs
 * Partner
 * VICE Voices
 * Content Funding on VICE
 * Security Policy
 * Privacy & Terms
 * Accessibility Statement
 * Do Not Sell My Info

© 2022 VICE MEDIA GROUP



HACKERS ARE USING ANTI-CHEAT IN 'GENSHIN IMPACT' TO RANSOM VICTIMS


The game’s anti-cheat system has well-known vulnerabilities that hackers are now
abusing to get access to sensitive parts of victims’ operating systems and
deploy ransomware.
by Lorenzo Franceschi-Bicchierai
August 26, 2022, 1:00pm
 * Share
 * Tweet
 * Snap

Image: HoYoverse
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and
reporting on the dark underbelly of the internet.
See More →

A ransomware gang is allegedly hacking victims by abusing the anti-cheat system
of the massively popular free-to-play game Genshin Impact.

The cybersecurity firm Trend Micro published a report on Wednesday with details
about the attack, highlighting how anti-cheat systems, which are installed by
default as part of many online games, can be abused to hack players. The unnamed
hackers are taking advantage of the fact that Genshin Impact’s anti-cheat system
has known vulnerabilities, that it’s signed by a legitimate company—meaning
Windows will run it—and because it has high privileges, meaning it has access to
sensitive parts of the operating system. 

Advertisement


“I’ve been expecting to see ransomware abuse an anti-cheat driver for a while.
We’ve seen cheats abuse anti-cheat drivers for years,” an employee of a games
company, who asked to remain anonymous because they weren't allowed to speak to
the press, told Motherboard. “It was just a matter of time before a ransomware
group noticed and started co-opting exploits that are openly shared.”

The hackers’ goal is to “mass-deploying ransomware,” according to Trend Micro.
Genshin Impact was released in 2020 by Chinese developer HoYoverse (miHoYo in
China) and has millions of players, who log into its game world via mobile
devices, consoles, or on PC. 

From Trend Micro’s report, it’s unclear how the hackers gain the initial
foothold into a targeted computer. But once they are in, the hackers are
exploiting Genshin Impact’s anti-cheat system to get access to the computer’s
kernel, a core part of the operating system that controls and has access to most
of the computer's functions. At that point the hackers have the ability to turn
off antivirus and install ransomware on the victims’ computers. 

In other words, they are abusing the anti-cheat system as a way to get access to
more sensitive parts of the operating system and avoid getting caught by an
antivirus before deploying the ransomware.

Advertisement


Trend Micro researchers note that the game “does not need to be installed on a
victim’s device for this to work,” meaning hackers can just install the
anti-cheat system as a preliminary step to then deploy the ransomware. 

> Do you have information about these attacks? Or other ransomware incidents?
> We'd love to hear from you. Using a non-work phone or computer, you can
> contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382,
> Wickr/Telegram/Wire @lorenzofb, or email lorenzofb@vice.com

Genshin Impact’s anti-cheat system is called mhyprot2. For years, security
researchers have warned about the anti-cheat’s flaws. In 2020, a researcher
showed that the system could be abused to read the computer’s memory and
processes. Then in July of last year, a researcher who goes by Kento Oki
published a proof-of-concept that turned the anti-cheat system into malicious
software that could access the kernel. 

These concerns have been publicly discussed outside security circles as well.
The website Pro Game Guides reported after the game’s launch that users were
concerned about the anti-cheat system because it had kernel-level privileges and
was running in the background even when the game was closed, going as far as
wondering if it was spyware. The company responded to these concerns by updating
the anti-cheat system so that it would turn off when users were not playing the
game. 

Advertisement


In other words, HoYoverse, the company that develops Genshin Impact, has known
that this version of the game’s anti-cheat system is vulnerable and can be
exploited for a couple of years. 

“We're currently working on this case, and will find a solution as soon as
possible to safeguard players' safety and stop potential abuse of the anti-cheat
function,” a HoYoverse spokesperson told Motherboard in an email.

Despite the long-running concerns, the vulnerable anti-cheat system is still
getting installed on players’ computers, and has not been patched. And,
according to Trend Micro researchers, “there are no solutions at this time”
because the anti-cheat system is a legitimate program signed by a real company,
and thus it’s not flagged by antivirus or Windows.

There are other anti-cheat systems that run in the kernel, giving them access
and visibility into what’s running on the operating system with the goal of
spotting cheat programs. The first one that gathered attention and led some to
ask whether it was going too far was Vanguard, the anti-cheat system for Riot
Games’ online first person shooter Valorant. Activision followed suit with
RICOCHET, a kernel-level anti-cheat system for its uber popular Call of Duty
games.

Advertisement


When making anti-cheat systems like these, developers have to be aware that the
system could be turned against users if there are vulnerabilities, according to
Paul Chamberlain, who was Riot’s anti-cheat lead when the company developed
Vanguard. 

“It was one of the primary worries we had when making Vanguard at Riot, we put a
lot of resources into security audits to try and ensure something like this
couldn't happen,” Chamberlain told Motherboard. 

Abusing drivers and other programs to push ransomware is a tried and true tactic
for cybercriminals, according to Allan Liska, a researcher at cybersecurity firm
RecordedFuture who focuses on ransomware. 

“Signed drivers are usually going to slip pass endpoint detection systems [such
as antivirus] unnoticed,” he said. 

UPDATE, Friday Aug. 26, 10:31 a.m. ET: This story was updated to include the
comment from a HoYoverse spokesperson.

Subscribe to our podcast, CYBER. Subscribe to our new Twitch channel.

Tagged:cybersecurityVideo
GamesCYBERcheatingcybercrimeransomwareanti-cheatworldnewsgenshin impactGame
Hacking


ORIGINAL REPORTING ON EVERYTHING THAT MATTERS IN YOUR INBOX.

Your Email:
Subscribe

By signing up, you agree to the Terms of Use and Privacy Policy & to receive
electronic communications from Vice Media Group, which may include marketing
promotions, advertisements and sponsored content.




MORE


LIKE THIS

 * Tech
   
   
   RUSSIA RELEASED A UKRAINIAN APP FOR HACKING RUSSIA THAT WAS ACTUALLY MALWARE
   
   Google researchers said the app was designed to figure out who may want to
   use this kind of app.
   
   Lorenzo Franceschi-Bicchierai
   07.19.22
   
 * Tech
   
   
   EUROPEAN COPS HELPED 1.5 MILLION PEOPLE DECRYPT THEIR RANSOMWARED COMPUTERS
   
   The European Union law enforcement agency estimates it has helped around 1.5
   million people save $1.5 billion by providing decryption tools for popular
   ransomware strains.
   
   Lorenzo Franceschi-Bicchierai
   07.26.22
   
 * Tech
   
   
   HACKER ADVERTISES ‘CRAPPY’ RANSOMWARE ON INSTAGRAM
   
   An unknown hacker who is likely to be from a “lower-tier” ransomware group
   used the social media app to entice potential customers.
   
   Lorenzo Franceschi-Bicchierai
   06.14.22
   
 * Tech
   
   
   INSIDE UKRAINE’S DECENTRALIZED CYBER ARMY
   
   A loose group of thousands of technologists and hackers is attacking Russian
   services and websites—and scoring significant wins.
   
   Lorenzo Franceschi-Bicchierai
   07.19.22
   
 * Tech
   
   
   MEET THE ENVIRONMENTAL HACKTIVISTS TRYING TO ‘SABOTAGE’ MINING COMPANIES
   
   A group of environmental hacktivists are targeting mining and oil companies
   in Central and South America, leaking their internal emails.
   
   Lorenzo Franceschi-Bicchierai
   08.16.22
   

Advertisement





YOUMAY LIKE
Diese fantastische Smartwatch hilft Ihnen, Ihre Gesundheitsdaten jederzeit zu
verfolgen Advertisement: gadgets4-you.com
Velasca: Handmade shoes, with plenty of love. Advertisement: Velasca
Moving forward to develop the finest products Advertisement: Dassault Systèmes
New "Lung Cleaning" Device Is Going Viral Advertisement: Product Hunter
The Best Men's Shoes for Walking and Standing All Day Advertisement: Orthopedic
Shoes
[Pics] School expels teen over outfit, regrets it when they see who dad is
Advertisement: React Share
Investment Expert Reveals: “A Massive Change Is Coming to the Market”
Advertisement: Visionary Profit
The Best Walking Shoes Don't Sacrifice Style for Comfort. Advertisement: Comfy
Shoes



MORE


FROM VICE

 * Tech
   
   
   DISCORD IS THE WORLD’S MOST IMPORTANT FINANCIAL MESSENGER, AND A HOTBED FOR
   SCAMMERS
   
   Rampant spam, phishing attacks, scammers, and malware—Discord has a lot of
   challenges securing crypto projects.
   
   Lorenzo Franceschi-Bicchierai
   05.31.22
   
 * Tech
   
   
   HACKER DISCOVERS HOW TO REMOTELY PWN A GAME BOY USING ‘POKÉMON CRYSTAL’ AFTER
   22 YEARS
   
   A security researcher found a bug in the Japanese version of Pokémon Crystal,
   which he realized could be exploited via a mobile adapter to hack a Game Boy
   via the internet.
   
   Lorenzo Franceschi-Bicchierai
   09.01.22
   
 * Tech
   
   
   HEAD OF UKRAINE’S CYBERSECURITY SAYS RUSSIA HAS COMMITTED ‘CYBER WAR CRIMES’
   
   Victor Zhora, head of Ukraine’s defensive cybersecurity agency, visited one
   of the biggest hacking conferences in the world this week.
   
   Lorenzo Franceschi-Bicchierai
   08.15.22
   
 * Tech
   
   
   HOW CRYPTOCURRENCY GAVE BIRTH TO THE RANSOMWARE EPIDEMIC
   
   Ransomware gangs are targeting everyone from large and small businesses and
   government agencies to hospitals and schools.
   
   Lorenzo Franceschi-Bicchierai
   04.15.22
   
 * Tech
   
   
   CYBER: UBER’S BEEN HACKED AND SIM SWAPPERS ARE GETTING VIOLENT
   
   The Uber hack is another warning about using your phone for 2FA.
   
   Matthew Gault
   09.19.22
   
 * Tech
   
   
   THE UBER HACK SHOWS PUSH NOTIFICATION 2FA HAS A DOWNSIDE: IT’S TOO ANNOYING
   
   The Uber hacker appears to have gained access to the company’s systems after
   spamming workers with multi-factor authentication requests.
   
   Lorenzo Franceschi-Bicchierai
   09.16.22
   

Advertisement





 * About
 * Jobs
 * Partner
 * VICE Voices
 * Content Funding on VICE
 * Security Policy
 * Privacy & Terms
 * Accessibility Statement
 * Do Not Sell My Info

© 2022 VICE MEDIA GROUP