![]() ![]() Specifically, the attack has executed after the attackers meddled with a NoxPlayer update. Rather the attackers have crippled the emulator with spyware, thus making the attack more of a cyberespionage campaign. Moreover, the malicious campaign doesn’t aim at disrupting gaming. Sharing the details, the researchers revealed that the attack appears as a highly specific activity targeting individual gamers. NoxPlayer precisely facilitates the gamers in playing Android games on PC, including Windows and macOS. Dubbed Operation NightScout, the threat is basically a supply-chain attack via the Android emulator NoxPlayer. Security researchers from ESET have shared insights about a new threat for online gamers in their recent post. NoxPlayer Android Emulator Supply-Chain Attack The attackers have crippled the Android emulator NoxPlayer with malware to target the gamers. Researchers have found a new supply-chain attack that targets the online gamers community. Implement file integrity verification using MD5 hashing and file signature checksĪdopt additional measures, notably encryption of sensitive data, to avoid exposing users’ personal informationīigNox have also stated that they have pushed the latest files to the update server for NoxPlayer and that, upon startup, NoxPlayer will now run a check of the application files previously installed on the users’ machines.ĮSET assumes no responsibility for the accuracy of the information provided by BigNox. Use only HTTPS to deliver software updates in order to minimize the risks of domain hijacking and Man-in-the-Middle (MitM) attacks UPDATE (February 3rd, 2021): Following the publication of our research, BigNox have contacted us to say that their initial denial of the compromise was a misunderstanding on their part and that they have since taken these steps to improve security for their users: ![]()
0 Comments
Leave a Reply. |