Minecraft mods: Should you 'hack' your game?
ATT&CK techniques detected
T1496.001Compute Hijacking
63%
"for their decryption. - cryptominers allow attackers to misuse someone else ' s device to illegally mine cryptocurrencies. also, mods downloaded from unreputable places carry additional, lesser - known risks. for instance, a mod that updates automatically can become a vehicle for…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1496Resource Hijacking
59%
"for their decryption. - cryptominers allow attackers to misuse someone else ' s device to illegally mine cryptocurrencies. also, mods downloaded from unreputable places carry additional, lesser - known risks. for instance, a mod that updates automatically can become a vehicle for…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1496Resource Hijacking
33%
"fractureiser infostealer. - the risks apply to the wider gaming ecosystem, as demonstrated by eset researchers who looked into campaigns spreading lumma stealer disguised as cheats for the hamster kombat game. how do attackers weaponize minecraft mods? malicious campaigns often f…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Some Minecraft mods don’t help build worlds – they break them. Here’s how malware can masquerade as a Minecraft mod.