Duet Night Abyss launcher spreads malware on Steam

Developers of the gacha RPG Duet Night Abyss have apologized for a cybersecurity incident that distributed malware to players' PCs via a launcher update on March 18. The malware, identified as Trojan:MSIL/UmbralStealer.DG!MTB, targets passwords and cryptocurrency. Players receive in-game compensation as the team implements security enhancements.

The free-to-play gacha RPG Duet Night Abyss, developed by Pan Studio and published by Hero Games, experienced a malicious attack on March 18. A patch to the game's launcher, released at 7:39 am UTC on Steam, contained the malware known as “Trojan:MSIL/UmbralStealer.DG!MTB” or “Umbral Stealer.” This infostealer records keystrokes, captures screenshots, and aims to harvest sensitive information like passwords and cryptocurrency wallets. Many players' antivirus software detected and quarantined it promptly due to its age and known signatures. The issue surfaced about 24 hours before the developers' public response on March 19. In a statement on the game's X account, the team noted: “Even after the initial breach, persistent attempts to continue the attack and spread misinformation have occurred. We strongly condemn these actions. As security is a vital pillar of a live product, this incident has served as a serious wake-up call for our team.” As compensation, affected players will receive “Commission Manual: Volume III*5, Prismatic Hourglass*10,” equivalent to ten free random skins. The developers have introduced several security enhancements to prevent future incidents. This marks the second compromise for Duet Night Abyss in a month; a prior launcher attack in late February was less severe, merely urging players to try Genshin Impact instead. Community reactions remain skeptical given the repeated breaches.

Artigos relacionados

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Imagem gerada por IA

Pacotes npm maliciosos roubam credenciais de desenvolvedores em múltiplas plataformas

Reportado por IA Imagem gerada por IA

Dez pacotes npm com erros de digitação intencionais, carregados em 4 de julho de 2025, foram encontrados baixando um infostealer que visa dados sensíveis em sistemas Windows, Linux e macOS. Esses pacotes, que imitam bibliotecas populares, evadiram a detecção por meio de múltiplas camadas de ofuscação e acumularam quase 10.000 downloads. A empresa de cibersegurança Socket relatou a ameaça, observando que os pacotes ainda estão disponíveis no registro.

The FBI has launched an investigation into malware embedded in several indie games on Steam, targeting users affected between May 2024 and January 2026. The agency is asking potential victims to come forward for possible restitution. Seven specific titles are under scrutiny.

Reportado por IA

Developer Pearl Abyss updated the Steam page for Crimson Desert to include Denuvo DRM on March 12, just days before the game's March 19 launch. The change has sparked backlash among PC players concerned about potential performance issues. The game has already surpassed 3 million wishlists.

Embark Studios has completed an investigation into recent exploits in Arc Raiders and begun issuing actions against abusers. The studio released update 1.000.023 on February 17, 2026, to enforce penalties including warnings, coin removals, and suspensions. This follows glitches that disrupted the game's economy and player experience.

Reportado por IA

Um grupo de ransomware conhecido como NightSpire assumiu a responsabilidade pelo hackeamento dos sistemas da Hyatt e roubo de dados. O grupo afirma ter obtido quase 50 GB de arquivos da cadeia hoteleira, que planeja vender. Este incidente destaca as ameaças contínuas de cibersegurança ao setor de hospitalidade.

O grupo de ransomware Qilin, também conhecido como Agenda, desenvolveu um ataque híbrido usando cargas úteis de Linux em hosts Windows para evadir a detecção. Ao abusar de ferramentas legítimas de gerenciamento remoto e explorar drivers vulneráveis, os atacantes desabilitam defesas e visam backups. Essa tática multiplataforma destaca a sofisticação evolutiva do ransomware.

Reportado por IA

O ator de ameaças zeta88 está promovendo uma nova operação de ransomware-as-a-service chamada The Gentlemen's RaaS em fóruns de hacking, visando sistemas Windows, Linux e ESXi. A plataforma oferece aos afiliados 90 por cento dos pagamentos de resgate e apresenta ferramentas de criptografia multiplataforma desenvolvidas em Go e C. Esse desenvolvimento destaca a comercialização contínua de ransomware sofisticado direcionado a ambientes empresariais.

 

 

 

Este site usa cookies

Usamos cookies para análise para melhorar nosso site. Leia nossa política de privacidade para mais informações.
Recusar