• Brett@feddit.org
    link
    fedilink
    English
    arrow-up
    36
    ·
    edit-2
    11 hours ago

    I had the mod installed in the timeframe were it had the malware. Fuck me.

    But what really pisses me off is that i read about it first here on lemmy. Not on the Beamng forums/repository, not in the game, not in the steam announcments of the game. Like you distributed malware over your platform and the policy of you fucks is just to stay silent? Meh.

    • Maestro@fedia.io
      link
      fedilink
      arrow-up
      9
      ·
      6 hours ago

      Why would it be in-game or a steam announcement? The malware was in a mod, not the base game. Mod authors can’t post game announcements. So, at best you get a comment of the workshop or on nexus.

      • FooBarrington@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 hours ago

        Because it’s supposed to reach affected users as quickly as possible, and a Steam/ingame announcement is the best way to do that? Slay The Spire made such an announcement when a popular mod was infected, and even though I didn’t use that mod, I still appreciated the outreach and care.

        Why are you acting like it’s such a crazy idea to use broad announcement channels to reach all affected users?

        • Maestro@fedia.io
          link
          fedilink
          arrow-up
          3
          ·
          4 hours ago

          It’s not a crazy idea. But it’s also perfectly reasonable for the game publisher to not involve themselves with mods.

          • FooBarrington@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            4 hours ago

            It’s not reasonable when it means their users are possibly affected by this vulnerability without being informed. Even if it’s mod stuff, they have a responsibility towards their customers - and it’s not like it hurts them in any way.

  • brsrklf@jlai.lu
    link
    fedilink
    English
    arrow-up
    37
    ·
    13 hours ago

    This made me think, okay, this particular exploit uses malicious code in a mod that targets an old embedded chromium vulnerability, and can be fixed by updating the game’s dependencies. This game started a dozen years ago, but it’s still being worked on.

    How many retro games that are not still in development could have vulnerabilities like that? Especially moddable games.

    • PoPoP@lemm.ee
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 hours ago

      Another thing I think about sometimes is how games can be malicious too. The trend in PC gaming for a while now is “flavor of the month” where every couple months a huge breakout title comes out and everyone plays it for a few weeks.

      The expectation from these games is that they run like shit despite being a fifth as graphically complex as a bigger budget game. What stops them from slipping a coin miner in for half a day at the peak of their popularity?

      Schedule 1 for example. I love this game and I’m not accusing them of anything, just an example. Let’s be honest. It runs at 100fps when it could run at 1000fps. Say the dev finally optimizes it, pushes the optimizations and a coin miner in a hotfix patch with no patch notes post on Steam. Six hours later the dev removes the coin miner and pushes that as a major patch with a patch notes release calling it the “optimization update” or something. We’d be none the wiser.

      Don’t take this as me saying not to support indie titles but it’s a little weird that millions of people install untrusted closed source code from 1-3 devs all at the same time every couple months.

      • brsrklf@jlai.lu
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 hours ago

        It could happen, but especially if the game has at least some popularity on a platform like Steam I expect someone more tech savvy than average would smell a rat and start looking, or ask around, and it’d be found out.

        I don’t know exactly how those work, but I imagine on top of weird CPU usage it would make very suspicious network calls too. There’s always a guy that sees stuff like that and goes “where the fuck are my cycles and packets going?”

        • PoPoP@lemm.ee
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          Yeah you’d think, but when I worked in cybersecurity the thing that freaked me out the most is how often this just doesn’t happen. It can happen immediately or it can take ages.

  • Bezier@suppo.fi
    link
    fedilink
    English
    arrow-up
    18
    ·
    edit-2
    9 hours ago

    Mods that contain code always feel sketchy to me. How much can I trust whoever made this dll or such?

    • brsrklf@jlai.lu
      link
      fedilink
      English
      arrow-up
      25
      ·
      13 hours ago

      If you want extended mod support, you kinda need it though. Stuff like Minecraft and Rimworld come to mind.

      Rimworld has very good official mod support that lets you do quite a lot with completely safe XML configuration files. But as soon as you want to deviate a bit from what the vanilla game allows, you’d have to code that and embed it as a DLL in your mod.

      Almost all gameplay or UI mods are DLL mods or depend on one. Quick survey : I have about 250 DLLs from my active mod list.

      • Bezier@suppo.fi
        link
        fedilink
        English
        arrow-up
        7
        ·
        13 hours ago

        I know, and I hate it. I think the only way to fix this would be to support some limited scripting language, but that also sucks for other reasons.

        Open source would also help with trust.

        • brsrklf@jlai.lu
          link
          fedilink
          English
          arrow-up
          7
          ·
          12 hours ago

          I literally have a Rimworld mod that calls an external python script as a feature.

          It’s a special case, of course said script is not part of the mod package, it has to be installed manually. What it does is allowing generating portraits for characters externally.

          I even rewrote the script to use local generation, but the one provided as an example calls an online API.

        • brsrklf@jlai.lu
          link
          fedilink
          English
          arrow-up
          8
          ·
          10 hours ago

          They certainly don’t review code, but on those there must be at least a scan for the most obvious malicious stuff. I am not sure it’d detect something hidden like in the article though. After all even on the guy’s PC it was only detected once it tried to actually download stuff.

          The good thing about workshop is visibility, if someone notices something shady it’ll be known fast. Not perfect, but probably better than getting your mods from random sites nobody knows.

    • truthfultemporarily@feddit.org
      link
      fedilink
      English
      arrow-up
      11
      ·
      13 hours ago

      Every mod that adds functionality can do everything the User can do, except when its sandboxed (for example factorio, TES without script extender). Its really a huge attack vector.