Winnti hacking group hits gaming firms with new backdoor malware

Winnti hacking group hits gaming firms with new backdoor malware

It is claimed that hackers are aiming to target Asian video game developers.


A brand new backdoor malware used by the notorious Winnti hacking group has been discovered by cybersecurity firm ESET researchers. 


The company published a report on Thursday revealing in-depth details about the new modular backdoor and how the hackers are trying to use it against gaming firms that mainly develop massively multiplayer online (MMO) games.


The malware, which ESET dubbed as PipeMon, is currently targeting gaming firms based in Taiwan and South Korea.


See: Top Dangers That Online Gamers Face


The researchers didn’t reveal the names of gaming firms that have been targeted. It is however, stated that the games developed by these firms are distributed across the globe, and are available on all popular gaming platforms while thousands of players are using their games.

It is worth noting that both countries are home to some of the most popular games and best gaming developers/brands including MSI, Asus ROG, and Acer Predator from Taiwan and Nexon, Gravity and Netmarble from South Korea. 


As per the analysis of ESET’s malware researcher Mathieu Tartare, there is a sound reason to believe that the Winnti hacking group is involved.



“Multiple indicators led us to attribute this campaign to the Winnti Group. Some of the command and control domains used by PipeMon were used by Winnti malware in previous campaigns. Furthermore, in 2019, other Winnti malware was found at some of the same comp ..

Support the originator by clicking the read the rest link below.