Duet Night Abyss launcher spreads malware on Steam

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

The free-to-play gacha RPG Duet Night Abyss, developed by Pan Studio and published by Hero Games, experienced a malicious attack on March 18. A patch to the game's launcher, released at 7:39 am UTC on Steam, contained the malware known as “Trojan:MSIL/UmbralStealer.DG!MTB” or “Umbral Stealer.” This infostealer records keystrokes, captures screenshots, and aims to harvest sensitive information like passwords and cryptocurrency wallets. Many players' antivirus software detected and quarantined it promptly due to its age and known signatures. The issue surfaced about 24 hours before the developers' public response on March 19. In a statement on the game's X account, the team noted: “Even after the initial breach, persistent attempts to continue the attack and spread misinformation have occurred. We strongly condemn these actions. As security is a vital pillar of a live product, this incident has served as a serious wake-up call for our team.” As compensation, affected players will receive “Commission Manual: Volume III*5, Prismatic Hourglass*10,” equivalent to ten free random skins. The developers have introduced several security enhancements to prevent future incidents. This marks the second compromise for Duet Night Abyss in a month; a prior launcher attack in late February was less severe, merely urging players to try Genshin Impact instead. Community reactions remain skeptical given the repeated breaches.

Articoli correlati

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Immagine generata dall'IA

Malicious npm packages steal developer credentials on multiple platforms

Riportato dall'IA Immagine generata dall'IA

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

The FBI has launched an investigation into malware embedded in several indie games on Steam, targeting users affected between May 2024 and January 2026. The agency is asking potential victims to come forward for possible restitution. Seven specific titles are under scrutiny.

Riportato dall'IA

Developer Pearl Abyss updated the Steam page for Crimson Desert to include Denuvo DRM on March 12, just days before the game's March 19 launch. The change has sparked backlash among PC players concerned about potential performance issues. The game has already surpassed 3 million wishlists.

Embark Studios has completed an investigation into recent exploits in Arc Raiders and begun issuing actions against abusers. The studio released update 1.000.023 on February 17, 2026, to enforce penalties including warnings, coin removals, and suspensions. This follows glitches that disrupted the game's economy and player experience.

Riportato dall'IA

A ransomware group known as NightSpire has claimed responsibility for hacking into Hyatt's systems and stealing data. The group states it has obtained nearly 50GB of files from the hotel chain, which it plans to sell. This incident highlights ongoing cybersecurity threats to the hospitality sector.

The Qilin ransomware group, also known as Agenda, has developed a hybrid attack using Linux payloads on Windows hosts to evade detection. By abusing legitimate remote management tools and exploiting vulnerable drivers, attackers disable defenses and target backups. This cross-platform tactic highlights evolving ransomware sophistication.

Riportato dall'IA

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

 

 

 

Questo sito web utilizza i cookie

Utilizziamo i cookie per l'analisi per migliorare il nostro sito. Leggi la nostra politica sulla privacy per ulteriori informazioni.
Rifiuta