cross-posted from: https://lemmy.zip/post/27055106
Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months.
cross-posted from: https://lemmy.zip/post/27055106
Hackers have used new GodLoader malware exploiting the capabilities of the widely used Godot game engine to evade detection and infect over 17,000 systems in just three months.
This is probably the larger story from the OP link:
Edit: a bit more info:
https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/
My take is that Godot has never claimed to be sandboxed, as long as OS.execute() is enabled by default then running arbitrary code in the user context is trivial. The solution of course is to only run code that you trust.
Yeah that is more headline worthy indeed.