cross-posted from: https://lemmy.zip/post/27055106

​Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months.

  • @[email protected]
    link
    fedilink
    97 months ago

    But this is bad news for game jams. Participants are not really trustworthy and those who do not build for HTML5 should not be evaluated.

    • GreyBeard
      link
      fedilink
      47 months ago

      This has always been true. If you are downloading an exe off the internet, it can be malicious. I am amazed by the streamers and Youtubers that seem willing to run anything. When I gamejam, I only write games that work in the browser and I only test/rate games that do the same. Unless you have a quarantine machine purpose built for running unknown code, it is really the only option.

      • @[email protected]
        link
        fedilink
        English
        47 months ago

        Thats true for anything that runs as a native app, but html builds will be sandboxed by the browser.

        • @[email protected]
          link
          fedilink
          27 months ago

          True, but the comment I was responding about not trusting non-web builds. This could imply that it’s only for non-web build Godot games while you could easily do this with any engine.

    • @[email protected]
      link
      fedilink
      37 months ago

      I mean… Every game you download and run can do almost anything on your computer, no matter what it’s written in. It’s just code.

      My first C2 agent I made for our malware to use in Red Teamings was a Unity Engine headless server.