{"id":159183,"date":"2023-02-27T23:23:01","date_gmt":"2023-02-28T05:23:01","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/02\/chromeloader-malware-targeting-gamers-via-fake-nintendo-and-steam-game-hacks"},"modified":"2023-02-27T23:23:01","modified_gmt":"2023-02-28T05:23:01","slug":"chromeloader-malware-targeting-gamers-via-fake-nintendo-and-steam-game-hacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/02\/chromeloader-malware-targeting-gamers-via-fake-nintendo-and-steam-game-hacks","title":{"rendered":"ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game Hacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/chromeloader-malware-targeting-gamers-via-fake-nintendo-and-steam-game-hacks.jpg\"><\/a><\/p>\n<p>A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking a deviation from the ISO optical disc image format.<\/p>\n<p>\u201cThese VHD files are being distributed with filenames that make them appear like either hacks or cracks for Nintendo and Steam games,\u201d AhnLab Security Emergency response Center (ASEC) <a href=\"https:\/\/asec.ahnlab.com\/en\/48211\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report last week.<\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2022\/07\/researchers-uncover-new-variants-of.html\" rel=\"noopener\" target=\"_blank\">ChromeLoader<\/a> (aka Choziosi Loader or ChromeBack) originally surfaced in January 2022 as a browser-hijacking credential stealer but has since evolved into a more potent, <a href=\"https:\/\/blogs.vmware.com\/security\/2022\/09\/the-evolution-of-the-chromeloader-malware.html\" rel=\"noopener\" target=\"_blank\">multifaceted<\/a> <a href=\"https:\/\/www.esentire.com\/blog\/chromeloader-observations-on-the-rise\" rel=\"noopener\" target=\"_blank\">threat<\/a> capable of stealing sensitive data, deploying ransomware, and even dropping <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zip_bomb\" rel=\"noopener\" target=\"_blank\">decompression bombs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking a deviation from the ISO optical disc image format. \u201cThese VHD files are being distributed with filenames that make them appear like either hacks or cracks for Nintendo and Steam games,\u201d AhnLab Security Emergency response Center (ASEC) said [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-159183","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/159183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=159183"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/159183\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=159183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=159183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=159183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}