Security specialists have discovered four malicious Dota 2 game modes that a threat actor used to backdoor the players’ systems. Avast Threat Labs researchers discovered that the unidentified attacker built four game modes for the wildly played Dota 2 multiplayer online battle arena video game and released them on the Steam store to target the game’s followers.
The Overdog no annoying heroes (id 2776998052), Custom Hero Brawl (id 2780728794), and Overthrow RTZ Edition X10 XP (id 2780559339) game modes, according to Jan Vojtek, an Avast malware researcher. Additionally, the attacker included a brand-new file called evil.lua, which was used to check the viability of server-side Lua execution. This malicious code fragment might be used to log, run arbitrary system commands, build coroutines, and send HTTP GET requests.
The twenty lines of malicious code included with the three newer game modes were far tougher to spot than the bundled backdoor that the threat actor inserted with the initial game mode that was made available on the Steam Store. The backdoor gave the threat actor access to the compromised devices from a distance, potentially enabling the installation of more malware.
Dota 2: How V8 Bug was exploited in the Game
One such problem impacts the hugely popular computer game Dota 2. Dota used a version of “v8.dll” that was compiled in December of last year. This shouldn’t come as a surprise build was susceptible to a number of CVEs, several of which have publicly available proof of concept (PoC) exploits. We found evidence of four published custom game modes in the wild using one of these vulnerabilities, CVE-2021-38003. The exploit alone allows for remote code execution against other Dota players because V8 was not sandboxed in Dota.
We informed Dota 2’s creator, Valve, of our results. In response, Valve updated the outdated and insecure version of V8 for Dota on January 12. Since Dota must be current for players to participate in online games, this update became effective immediately. Additionally, Valve removed the problematic custom game modes, alerted the players, and added new mitigations to lessen the attack surface of the game.
On Dota 2 Game Servers, Backdoor Lua Code Was Executed (Avast)
The Dota 2 MOBA game creator Valve upgraded the vulnerable V8 version on January 12, 2023, as a result of Avast’s discoveries. Previously, Dota 2 utilized a version of v8.dll that was created in December 2018.
Additionally, Valve disabled the malicious game modes and informed every player who had been a victim of the attack. “We may agree that this attack was not very large-scale in any case. Valve claims that fewer than 200 gamers were impacted “Vojtek tacked on.
The creator of the North GTA hack also made use of a Grand Theft Auto Online remote code execution vulnerability in January to integrate features that might ban and alter players’ accounts in a version that was released on January 20, 2023.
On January 21, the cheat’s developer deleted the features in a fresh version and issued an apology for the mayhem the cheat’s users had caused.
On February 2, Rockstar Games, the company that created Grand Theft Auto, released a security update to fix the Grand Theft Auto Online problem.
The video game “Dota 2” by video game creator, Valve, has a remote code execution vulnerability, according to Avast security analysts. The Avast team informed Valve of their discoveries, and in response, Valve updated Dota on January 12 to patch the V8 vulnerability. In addition, Valve announced the issue to the players and added new mitigations to lessen the attack surface of the game. Since Dota must be current for players to participate in online games, this update became effective immediately.
Dota made use of a version of “v8.dll” that was compiled in December of last year. This build was susceptible to a number of CVEs, several of which have publicly available proof of concept (PoC) exploits. We found evidence of four published custom game modes in the wild using one of these vulnerabilities, CVE-2021-38003. The exploit alone allows for remote code execution against other Dota players because V8 was not sandboxed in Dota.