Minecraft players are under attack - but it might not actually be all bad

Minecraft
(Image credit: Microsoft/Mojang)

A new variant of the Chaos ransomware is attacking Minecraft players looking to get their hands on alternate accounts to cheat or circumvent bans.

Microsoft owned-Minecraft is one of the most popular games in recent times, though its popularity has also resulted in an influx of cheaters to the platform.

While Minecraft routinely catches and bans cheaters, many rely on alternative or "alt" accounts, to continue their nefarious activities. 

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Recently, cybersecurity researchers from Fortinet Labs discovered a variant of the Chaos ransomware hidden in a file that pretended to contain a list of such Minecraft alt accounts.

Cheating cheaters

In a post detailing the activity, Fortinet researchers Shunichi Imano and Fred Gutierrez argue that the ransomware appears to target Minecraft players in Japan.

Analyzing the variant, the researchers note that the ransomware searches for and encrypts all files smaller than 2MB. However, bigger files of certain file types are overwritten with random data, rendering them unrecoverable even after the payment of the ransom.

Furthermore, although the malware doesn’t exfiltrate the encrypted data, it does delete shadow copies from the compromised machines, further complicating recovery. The attackers demand cryptocurrency worth 2,000 Yen or about $17.5.

“Despite its cheap ransom demand, its ability to destroy data and render it unrecoverable makes it more than a mere prank to annoy Japanese Minecraft gamers….The best advice is for players to stay off suspicious gaming cheat sites and simply enjoy the game the way it was meant to be played,” conclude the researchers.

Use one of the best endpoint protection tools to add another layer of defense against such file-borne cyberattacks

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A white padlock on a dark digital background.
GitHub is hiding malware disguised as games, legitimate software
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
botnet
YouTubers targeted by blackmail campaign to promote malware on their channels
Illustration of a laptop with a magnifying glass exposing a beetle on-screen
This devious macOS malware is evading capture by using Apple's own encryption
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
A laptop with a red screen with a white skull on it with the message: &quot;RANSOMWARE. All your files are encrypted.&quot;
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)