Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

Posted on June 18, 2025June 18, 2025 By CWS

A brand new multi-stage malware marketing campaign is concentrating on Minecraft customers with a Java-based malware that employs a distribution-as-service (DaaS) providing known as Stargazers Ghost Community.
“The campaigns resulted in a multi-stage assault chain concentrating on Minecraft customers particularly,” Test Level researchers Jaromír Hořejší and Antonis Terefos stated in a report shared with The Hacker Information.
“The malware was impersonating Oringo and Taunahi, that are ‘Scripts and macros instruments’ (aka cheats). Each the primary and second levels are developed in Java and may solely be executed if the Minecraft runtime is put in on the host machine.”
The tip purpose of the assault is to trick gamers into downloading a Minecraft mod from GitHub and ship a .NET data stealer with complete knowledge theft capabilities. The marketing campaign was first detected by the cybersecurity firm in March 2025.
What makes the exercise notable is its use of a bootleg providing known as the Stargazers Ghost Community, which makes use of 1000’s of GitHub accounts to arrange tainted repositories that masquerade as cracked software program and sport cheats.

These malicious repositories, masquerading as Minecraft mods, function a conduit for infecting customers of the favored online game with a Java loader (e.g., “Oringo-1.8.9.jar”) that continues to be undetected by all antivirus engines as of writing.
The Java archive (JAR) recordsdata implement easy anti-VM and anti-analysis methods to sidestep detection efforts. Their essential goal is to obtain and run one other JAR file, a second-stage stealer that fetches and executes a .NET stealer as the ultimate payload when the sport is began by the sufferer.
The second-stage part is retrieved from an IP tackle (“147.45.79.104”) that is saved in Base64-encoded format Pastebin, primarily turning the paste software right into a useless drop resolver.
“So as to add mods to a Minecraft sport, the consumer should copy the malicious JAR archive into the Minecraft mods folder. After beginning the sport, the Minecraft course of will load all mods from the folder, together with the malicious mod, which is able to obtain and execute the second stage,” the researchers stated.

Moreover downloading the .NET stealer, the second-stage stealer is provided to steal Discord and Minecraft tokens, in addition to Telegram-related knowledge. The .NET stealer, alternatively, is able to harvesting credentials from numerous net browsers and gathering recordsdata, and knowledge from cryptocurrency wallets and different apps like Steam, and FileZilla.
It will possibly additionally take screenshots and amass data associated to operating processes, the system’s exterior IP tackle, and clipboard contents. The captured data is finally bundled and transmitted again to the attacker through a Discord webhook.
The marketing campaign is suspected to be the work of a Russian-speaking risk actor owing to the presence of a number of artifacts written within the Russian language and the timezone of the attacker’s commits (UTC+03:00). It is estimated that greater than 1,500 gadgets might have fallen prey to the scheme.
“This case highlights how widespread gaming communities may be exploited as efficient vectors for malware distribution, emphasizing the significance of warning when downloading third-party content material,” the researchers stated.
“The Stargazers Ghost Community has been actively distributing this malware, concentrating on Minecraft gamers looking for mods to reinforce their gameplay. What seemed to be innocent downloads had been, actually, Java-based loaders that deployed two extra stealers, able to exfiltrating credentials and different delicate knowledge.”
New Variants of KimJongRAT Stealer Detected
The event comes as Palo Alto Networks Unit 42 detailed two new variants of an data stealer codenamed KimJongRAT that is doubtless linked to the identical North Korean risk actor behind BabyShark and Stolen Pencil. KimJongRAT has been detected within the wild way back to Could 2013, delivered as a secondary payload in BabyShark assaults.

“One of many new variants makes use of a Moveable Executable (PE) file and the opposite makes use of a PowerShell implementation,” safety researcher Dominik Reichel stated. “The PE and PowerShell variants are each initiated by clicking a Home windows shortcut (LNK) file that downloads a dropper file from an attacker-controlled content material supply community (CDN) account.”

Whereas the PE variant’s dropper deploys a loader, a decoy PDF and a textual content file, the dropper within the PowerShell variant deploys a decoy PDF file together with a ZIP archive. The loader, in flip, downloads auxiliary payloads, together with the stealer part for KimJongRAT.
The ZIP archive delivered by the PowerShell variant’s dropper accommodates scripts that embed the KimJongRAT PowerShell-based stealer and keylogger elements.
Each the brand new incarnations are able to gathering and transferring sufferer data, recordsdata matching particular extensions, and browser knowledge, equivalent to credentials and particulars from cryptocurrency pockets extensions. The PE variant of KimJongRAT can also be designed to reap FTP and e-mail consumer data.
“The continued growth and deployment of KimJongRAT, that includes altering methods equivalent to utilizing a authentic CDN server to disguise its distribution, demonstrates a transparent and ongoing risk,” Unit 42 stated. “This adaptability not solely showcases the persistent risk posed by such malware but additionally underscores its builders’ dedication to updating and increasing its capabilities.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Game, GitHub, Infected, Java, Malware, Masquerading, Minecraft, Mods, Players

Post navigation

Previous Post: Critical Vulnerability Patched in Citrix NetScaler
Next Post: PLA Rapidly Deploys AI Technology Across Military Intelligence Operations

Related Posts

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign The Hacker News
Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack The Hacker News
U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud The Hacker News
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit The Hacker News
New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users The Hacker News
Critical RCE Bug Rated 9.9 CVSS in Backup & Replication The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT
  • Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Bypass Gmail MFA with App Specific Password Ruse
  • Halo Security Honored with 2025 MSP Today Product of the Year Award
  • Gerrit Misconfiguration Exposed Google Projects to Malicious Code Injection
  • Famous Chollima Hackers Attacking Windows and MacOS Users With GolangGhost RAT
  • Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News