Duet Night Abyss launcher spreads malware on Steam

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

The free-to-play gacha RPG Duet Night Abyss, developed by Pan Studio and published by Hero Games, experienced a malicious attack on March 18. A patch to the game's launcher, released at 7:39 am UTC on Steam, contained the malware known as “Trojan:MSIL/UmbralStealer.DG!MTB” or “Umbral Stealer.” This infostealer records keystrokes, captures screenshots, and aims to harvest sensitive information like passwords and cryptocurrency wallets. Many players' antivirus software detected and quarantined it promptly due to its age and known signatures. The issue surfaced about 24 hours before the developers' public response on March 19. In a statement on the game's X account, the team noted: “Even after the initial breach, persistent attempts to continue the attack and spread misinformation have occurred. We strongly condemn these actions. As security is a vital pillar of a live product, this incident has served as a serious wake-up call for our team.” As compensation, affected players will receive “Commission Manual: Volume III*5, Prismatic Hourglass*10,” equivalent to ten free random skins. The developers have introduced several security enhancements to prevent future incidents. This marks the second compromise for Duet Night Abyss in a month; a prior launcher attack in late February was less severe, merely urging players to try Genshin Impact instead. Community reactions remain skeptical given the repeated breaches.

Artikel Terkait

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Gambar dihasilkan oleh AI

Paket npm berbahaya mencuri kredensial pengembang di berbagai platform

Dilaporkan oleh AI Gambar dihasilkan oleh AI

Sepuluh paket npm dengan kesalahan ketik yang disengaja, diunggah pada 4 Juli 2025, ditemukan mengunduh infostealer yang menargetkan data sensitif di sistem Windows, Linux, dan macOS. Paket-paket ini, yang meniru pustaka populer, menghindari deteksi melalui beberapa lapisan ofusaksi dan mengumpulkan hampir 10.000 unduhan. Perusahaan keamanan siber Socket melaporkan ancaman tersebut, mencatat bahwa paket-paket tersebut masih tersedia di registry.

The FBI has launched an investigation into malware embedded in several indie games on Steam, targeting users affected between May 2024 and January 2026. The agency is asking potential victims to come forward for possible restitution. Seven specific titles are under scrutiny.

Dilaporkan oleh AI

Developer Pearl Abyss updated the Steam page for Crimson Desert to include Denuvo DRM on March 12, just days before the game's March 19 launch. The change has sparked backlash among PC players concerned about potential performance issues. The game has already surpassed 3 million wishlists.

Embark Studios has completed an investigation into recent exploits in Arc Raiders and begun issuing actions against abusers. The studio released update 1.000.023 on February 17, 2026, to enforce penalties including warnings, coin removals, and suspensions. This follows glitches that disrupted the game's economy and player experience.

Dilaporkan oleh AI

Kelompok ransomware yang dikenal sebagai NightSpire mengklaim bertanggung jawab atas peretasan sistem Hyatt dan pencurian data. Kelompok tersebut menyatakan telah memperoleh hampir 50 GB file dari rantai hotel tersebut, yang direncanakan untuk dijual. Insiden ini menyoroti ancaman keamanan siber yang berkelanjutan terhadap sektor perhotelan.

Kelompok ransomware Qilin, juga dikenal sebagai Agenda, telah mengembangkan serangan hibrida menggunakan muatan Linux pada host Windows untuk menghindari deteksi. Dengan menyalahgunakan alat manajemen jarak jauh yang sah dan mengeksploitasi driver rentan, penyerang menonaktifkan pertahanan dan menargetkan cadangan. Taktik lintas-platform ini menyoroti kecanggihan ransomware yang berkembang.

Dilaporkan oleh AI

Aktor ancaman zeta88 sedang mempromosikan operasi ransomware-as-a-service baru bernama The Gentlemen's RaaS di forum hacking, menargetkan sistem Windows, Linux, dan ESXi. Platform ini menawarkan afiliasi 90 persen dari pembayaran tebusan dan menampilkan alat enkripsi lintas platform yang dikembangkan dalam Go dan C. Perkembangan ini menyoroti komersialisasi berkelanjutan ransomware canggih yang menargetkan lingkungan perusahaan.

 

 

 

Situs web ini menggunakan cookie

Kami menggunakan cookie untuk analisis guna meningkatkan situs kami. Baca kebijakan privasi kami untuk informasi lebih lanjut.
Tolak