A vulnerability in Valve’s Source Engine allowed hackers to take control of gamers’ PCs. According to OneUpSecurity, hackers targeted games such as CS:GO, Left 4 Dead 2, and Team Fortress 2 as vessels to inject malicious code. The culprits used custom assets in user-created maps to carry the malware. In fact, tests triggered the code by killing the player’s character. That’s just plain mean.
OneUpSecurity’s Justin Taff reported on the exploit last week. The researchers made Valve aware of the issue prior to publication, though. Taff revealed that the “Source SDK contained a buffer overflow vulnerability which allowed remote code execution on clients and servers”. Taff tested the vulnerability by creating a custom ragdoll model: triggering the ragdoll animation by killing a character would execute the malicious code. Double-owned.
Thankfully, Taff reports that Valve “swiftly” patched the Source vulnerability. He adds, though, that exploiting games to spread malicious code is an increasing danger. Of course, the perceived lack of risk means many don’t consider games to be a potential medium for viruses. Taff warns gamers to not install games on work devices and restrict gaming machines to untrusted networks. Air-gaps between public and private networks are also potentially exploitable, he says.
According to a new report, the GeForce RTX 5090 GPU will be very expensive. It…
A new AMD processor in the form of an engineering model has been leaked in…
SK Hynix has claimed to be the first company to mass-produce 321-layer NAND memory chips.…
SOUNDS GREAT – Full stereo sound (12W peak power) gives your setup a booming audio…
Special Edition Yoshi design Ergonomic controller shape with Nintendo Switch button layout Detachable 10ft (3m)…
Fluid Motion: These flight rudder pedals are smooth and accurate that enable precise control over…