How this OPEN SOURCE "Cheat" Hacks You
41,242
Publicado 2024-07-29
Official Discord Server - discord.gg/ericparker
Follow me on X - www.twitter.com/atericparker
Disclaimer: The content in this video is for education and entertainment purposes to showcase the dangers of malware & malicious software. I do not encourage any form of illegal hacking, nor do I encourage the usage of game cheats, cracks or hacks.
Cracks are sometimes shown to highlight the dangers of software piracy, my content is not intended to teach anybody how to pirate, or maliciously hack.
More Malware Investigation Videos:
→ The latest "NORD" Malware - Nordsecured: • The latest 'NORD' Malware - Nordsecured
→🧧VIRUS WARNING🧧 NEW Optifine for Minecraft 1.16 SCAM: • 🧧VIRUS WARNING🧧 NEW Optifine for Mine...
→ The wilkreate YouTube stealer virus that started this whole trend: • Fake sponsor DESTROYS YOUTUBE CHANNEL
(C) Eric Parker
Todos los comentarios (21)
-
> Open source > Look inside > Electron slop Yes it's toddler malware.
-
0:37 not only are they reading the comments, but they probably are the comments pointing people to their malicious cheats
-
the commit names are so professional, good work from their side completely legit
-
This might seem like a stupid question but how do people deal with info stealers? Seems like a game over kind of thing. You just lose all your accounts? Is it only if you sign into something after installing the stealer? So you don't lose everything but it's still an awful thing to go through. Seems like a nightmare.
-
Maybe just don't cheat
-
the cat ears remember
-
idk anything about cheating or coding, but your videos are very good with good info on these rats and hidden malwares! its enjoyable to watch. thanks
-
I have seen a malware campaign similar to this, but by the same threat actor, as it uses the string “muck” in the urls and had same distribution vector (fake cheat source code). However, it uses RTL characters and an scr. It used a FUD node payload too. The EXE is fud because it is not malicious in itself, as the real stuff is in app.asar. Usually it’s detected by Kaspersky in runtime.
-
That exe file is likely harmless. The real deal in electron malware usually lies in resource/app.asar, except for the 3CX one done by the DPRK.
-
1:57 what AI is that? I never knew it was good at detecting malware, especially identifying it Ah, it's Claude. I'd never heard of it before!
-
It running at compile time is clever.
-
idk if is the same, but there is a obfuscator that does let you build a Remote access trojan using that kind of obfuscation
-
Hiding in the build script reminds me of the XZ backdoor where the malicious component was hidden in the tests and injected the backdoor into the binary after compiling, during testing
-
"ctrl + /" to comment a line in the file extension's appropriate syntax in visual studio code
-
Yeah the software is doing what's being told to do, is cheating but we didn't talked on who.
-
The malware is pretty classic, however hiding it during compile time is really clever
-
The only time im happy to see malware
-
This looks like it is impersonating some processes like search filter. Is there an easy way to detect those? For example if the process is causing an unusually high cpu load, is it possible to check if the underlying exe is real?
-
what programs are you using for forenzics here?
-
You say that open source cheats are bad cause the anti cheat will detect them however EAC on Linux for example runs on usermode and so any cheat that doesnt write to memory, with 2-3 precaution steps like running the cheat at root level and hiding root pids, will make it undetectable.