Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Fake Battlefield 6 Popularity to Deploy Stealers and C2 Agents

Posted on November 27, 2025November 27, 2025 By CWS

Since its launch in October, Battlefield 6 has turn out to be one of many 12 months’s most anticipated sport launches. Nonetheless, cybercriminals have rapidly seized on this recognition to distribute malicious software program.

Attackers have created faux cracked variations of the sport and fraudulent sport trainers, spreading them throughout torrent web sites and underground boards to focus on unsuspecting gamers and people looking for sport modifications.

The malicious campaigns impersonate well-known sport cracking teams like InsaneRamZes and RUNE, utilizing their respectable names to realize consumer belief and credibility. This tactic mirrors widespread model impersonation assaults utilized in different sectors.

The criminals have developed three distinct kinds of malware, every serving totally different targets starting from stealing browser information and cryptocurrency pockets credentials to establishing persistent distant management over contaminated methods.

Bitdefender Labs safety researchers recognized these malware campaigns after analyzing a number of samples.

The investigation revealed that not one of the malicious information comprise precise Battlefield 6 performance, they usually probably originate from totally different risk teams based mostly on their various technical approaches.

The primary malware pattern operates as a easy however aggressive data stealer disguised as a “Battlefield 6 Coach Installer.” Customers can simply uncover it on Google’s second search outcomes web page, making it extremely accessible to potential victims.

As soon as executed, the malware scans native directories and browser profiles to extract delicate information, together with crypto pockets data, cookie periods from browsers like Chrome, Edge, and Firefox, Discord session tokens and credentials, and cryptocurrency pockets extension information from Chrome plugins comparable to iWallet and Yoroi.

Regional execution blocking (Supply – Bitdefender)

The stolen data travels to server 198.251.84.9 over unencrypted HTTP with none obfuscation makes an attempt.

The second variant, distributed as “Battlefield 6.GOG-InsaneRamZes,” demonstrates considerably extra sophistication by superior evasion techniques.

The malware implements regional execution blocking that stops operation when it detects Russian or CIS nation settings, a typical self-protection measure utilized by teams based mostly in these areas.

Home windows API hashing (Supply – Bitdefender)

It employs Home windows API hashing to obscure its operations and runs anti-sandbox detection checks utilizing timing evaluation to find out system uptime.

Moreover, reminiscence evaluation revealed references to improvement instruments like Postman and BitBucket, suggesting the malware targets developer credentials and API keys for additional exploitation.

The third pattern, disguised as a Battlefield 6 ISO picture, delivers a persistent command-and-control agent. The 25MB executable accommodates compressed information that unpacks and creates a file named “2GreenYellow.dat” within the consumer listing, then silently executes it utilizing regsvr32.exe.

The put in DLL repeatedly makes an attempt contact with ei-in-f101.1e100.web, showing to make use of Google’s infrastructure as a relay or communication disguise. The C2 construction signifies functionality for distant command execution or future information theft.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Agents, Battlefield, Deploy, Exploiting, Fake, Hackers, Popularity, Stealers

Post navigation

Previous Post: Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web
Next Post: Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Related Posts

Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Cyber Security News
65% of Leading AI Companies Exposes Verified Secrets Including Keys and Tokens on GitHub Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
Google Announces Public Preview of Alert Triage and Investigation Agent used in Google Security Operations Cyber Security News
Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach
  • Hackers Actively Attacking Telecommunications & Media Industry to Deploy Malicious Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI User Data Exposed in Mixpanel Hack
  • Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps
  • AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
  • OpenAI Discloses Mixpanel Data Breach
  • Hackers Actively Attacking Telecommunications & Media Industry to Deploy Malicious Payloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark