Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely

Hackers Hijacked Apex Legends Game to Control the Inputs of Another Player Remotely

Posted on January 13, 2026January 13, 2026 By CWS

A big safety incident has emerged in Apex Legends, the place attackers gained the power to remotely management participant inputs throughout energetic gameplay.

The incident got here to gentle when Respawn Leisure disclosed the vulnerability via their official social media channels on January 10, 2026.

This represents a notable breach within the aggressive gaming setting, permitting malicious actors to intrude with different gamers’ actions with out their information or consent.

The safety flaw demonstrates how sport consumer vulnerabilities might be exploited to compromise participant expertise and aggressive integrity.

The assault operates by enabling attackers to grab management of keyboard and mouse inputs from focused gamers whereas they’re engaged in matches.

Gamers instantly discovered their characters performing actions they didn’t provoke, together with unintended motion, capacity utilization, and weapon deployment.

The distant enter hijacking functionality creates an unfair benefit for attackers and instantly impacts the gaming expertise of victims who lose management of their characters mid-gameplay.

Such a vulnerability raises issues concerning the safety infrastructure defending on-line multiplayer video games and the potential for comparable exploits throughout different gaming platforms.

Respawn analysts recognized the incident after investigating experiences from affected gamers experiencing uncommon character habits.

The corporate’s preliminary evaluation revealed that attackers weren’t executing distant code or performing injection assaults on the sport consumer.

As a substitute, the exploit seems to function via a distinct mechanism that particularly targets enter dealing with mechanisms inside Apex Legends.

This distinction is essential as a result of it suggests the vulnerability exists inside a selected part of the sport somewhat than compromising your complete system.

Enter Hijacking Mechanism and Assault Vector

The enter hijacking exploit works by intercepting communications between the participant’s enter units and the sport consumer.

Reasonably than requiring full system compromise, the assault targets the pathway via which participant actions attain the sport server.

The vulnerability permits attackers to inject unauthorized enter instructions that the sport processes as reputable participant actions.

This system bypasses the conventional authentication checks for participant inputs, making it seem to the sport server that the hijacked actions originated from the reputable participant account.

The technical implementation seemingly entails intercepting community packets or reminiscence areas the place enter information is saved earlier than transmission to the sport server.

By understanding how Apex Legends processes keystroke and mouse motion information, attackers developed a technique to insert their very own instructions into this pipeline.

The sport consumer accepts these injected inputs with out detecting the intrusion, leading to distant participant management.

Respawn’s assertion clarifying that distant code execution was not concerned signifies the vulnerability exists on the enter validation stage somewhat than at deeper system layers.

The group actively labored on growing patches to validate enter sources and implement extra safety checks to forestall future unauthorized command injection makes an attempt.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Apex, Control, Game, Hackers, Hijacked, Inputs, Legends, Player, Remotely

Post navigation

Previous Post: SAP’s January 2026 Security Updates Patch Critical Vulnerabilities
Next Post: Threat Actors Leveraging RMM Tools to Attack Users via Weaponized PDF Files

Related Posts

SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are SquareX Reveals That Employees Are No Longer The Weakest Link, Browser AI Agents Are Cyber Security News
Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Okta Security Releases Auth0 Event Logs for Proactive Threat Detection Cyber Security News
German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure German ISP Aurologic GmbH has Become a Central Nexus for Hosting Malicious Infrastructure Cyber Security News
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits Cyber Security News
DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files DarkBit Hackers Attacking Vmware ESXi Servers to Deploy Ransomware and Encrypt VMDK Files Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News