New Gamaredon Phishing Attack Targeting Govt Entities Exploiting WinRAR Vulnerability

Cybersecurity
Recent analysis by Gen Threat Labs has revealed a significant rise in the use of video game cheats and mod tools as vectors for infostealer malware distribution. These software applications, often used for enhancing gaming performance or modifying gameplay, are increasingly being manipulated to execute credential theft campaigns targeting both casual and professional gamers.
The growing popularity of these threats highlights a substantial gap in user awareness and software verification within the gaming community. Attackers exploit the trust users place in gaming resources, embedding malicious payloads within cheat engines, mod managers, and game optimization tools. These tools are frequently disseminated through torrent platforms, forums, and unofficial game communities.
The infostealer variants specifically target stored credentials, cryptocurrency wallets, browser cookies, and sensitive authentication tokens, which are highly valuable in underground markets.
Gen Threat Labs identified this trend during routine threat monitoring operations in late October 2025. Their findings indicate an acceleration in the use of gaming platforms as primary channels for infostealer campaigns.
Infection Mechanism and Persistence Tactics
The infection chain typically begins when users download compromised cheat software from seemingly reputable sources. Upon execution, the infostealer establishes persistence by modifying the Windows Registry and creating startup entries that mimic legitimate system processes.
The malware uses a multi-stage approach, initially conducting reconnaissance to gather system information and existing credentials. This is followed by data exfiltration to attacker-controlled infrastructure. The persistence layer employs scheduled task creation and process injection to maintain system access across reboots. Security researchers have observed samples using legitimate Windows utilities for credential dumping, including LSASS memory scraping and SAM database extraction.
Communication with command-and-control servers is maintained through encrypted HTTPS channels, allowing the malware to report stolen data, receive configuration updates, and download additional payloads.
To mitigate the risk of infection, users seeking enhanced gaming experiences should obtain cheats and mods exclusively from official game publishers or verified community repositories with strong security records. Additionally, implementing multi-factor authentication, maintaining updated endpoint protection, and deploying behavioral monitoring solutions are effective defenses against these threats.













