Security analysts from Korea have detected a malware distribution campaign using Valorant cheat lures on YouTube in order to trick players into downloading RedLine, a powerful information stealer.

This kind of lure is relatively common as threat actors can easily avoid YouTube’s new content submission reviews, or simply create new accounts when old ones are reported and blocked.

ASEC spotted the campaign, which targets the gaming community of Valorant, a free first-person shooter for Windows, which offers a link to download an auto-aiming bot in the video description.

The download link claims to be an add-on installed in the game allowing players to automatically aim at enemies without having to demonstrate any skill.

Auto-aiming bots are highly sought-after for popular multiplayer games like Valorant because they allow effortless ranking progression.

The post Malware hidden in fake Valorant aim-bot appeared first on IT Security Guru.


You May Also Like

API Security in the spotlight as Salt Security becomes next Black Unicorn

In December 2021, Gartner® reviewed its earlier predictions about API attacks, commenting, “On…

One Identity launches Cloud Infrastructure Entitlement Management

One Identity, the provider of unified identity security, has announced the availability…