PlugX Malware Found in Official Releases of League of Legends, FIFA Online 3

Games have always been a popular social engineering lure to trick users into downloading malware into their PCs. Cybercriminals try to package their malware to look as authentic and legitimate as possible. But sometimes, they go the extra mile and package their malware with the legitimate game.

Compromised Official Releases

This was certainly the case for PC users in a recent incident involving the online games League of Legends (LoL), Path of Exile (PoE), and FIFA Online 3. Variants of the remote access Trojan (RAT) PlugX were found in the official releases of the three games, and appeared to target users based in certain countries in Asia.

Players may unwittingly trigger the infection chain by downloading the legitimate installer or updates for the game itself. The compromise game launcher will then drop three files:

  • A legitimate game launcher
  • A “cleaner” that overwrites the compromised launcher with the legitimate one
  • A dropper installs PlugX binaries

The cleaner file could be seen as one way of covering up any traces of malicious activity. In the end, the victim will only see two malicious files, NtUserEx.dll and NtUserEx.dat (both detected as BKDR_PLUGX.ZTBL-EC).

PlugX allows remote users to perform malicious and data theft routines on a system without the user’s permission or authorization. PlugX variants often target legitimate apps so the use of these games is not new. One marked difference is that this PlugX variant created its own autostart service rather than relying on the legitimate app’s.

A closer look reveals that the string “Cooper” can be found in the malware’s body. No coincidence then that the name “Lee Cooper” can be found in the registrant information of the related command and control (C&C) server.

Figure01_Cooper

Figure 1. The string “Cooper” can be found in the malware

While checking the certificate, we noticed that the hash value applied to the suspect file was VALID, which  means that the “signing tool” was used to pair with the compromised binary’s hash.  The clean game launcher, on the other hand, has an invalid digital signature.

We also noticed that the compromised LoL and PoE launchers have invalid digital certificates.

Figure02_digitalcertificate

Figure 2. Legitimate application with invalid digital signature (left) and compromised application with a valid digital signature (right)

Tracing the Source

These compromised official releases were traced back to Garena, a consumer Internet platform provider in Asia. Garena has partnerships with game developers such as Riot Games, S2 Games, and Electronic Arts, allowing the company to have exclusive releases to certain games.

In an official post, Garena stated that “computers and patch servers were infected with Trojans. As a result, all the installation files distributed for the games League of Legends and Path of Exile are infected.” Further investigation by our engineers found that FIFA Online 3, another Garena release, was also compromised.

Taiwan and Singapore, Most Affected

Based on analysis, it seems that only the Taiwanese versions of the LoL and PoE installers were compromised. FIFA Online 3 victims are mostly from Singapore, as the download link is hosted in the same country.

Feedback from the Trend Micro™ Smart Protection Network™ supports these findings. However, we have also seen victims from other Asian countries such as Thailand, Malaysia, and Hong Kong. Analysis of the C&C activity shows that these countries are part of the top countries which accessed the C&C server.

Figure02_piechart

Figure 3. Affected countries

The activity soon died down after Garena released their official announcement.

Protecting the Gamers

Currently, the installers on Garena’s website and other associated links have been verified to be clean since December 29, 2014. Trend Micro has released a clean-up tool for related infections that gamers may use. Garena has also recommended several steps to protecting player accounts:

  • Update games
  • Scan computers with a security solution
  • Change passwords for accounts
  • Use the two-step verification provided by Garena

Trend Micro detects and blocks all associated threats.

Related hashes:

  • f920e6b34fb25f54c5f9b9b3a85dca6575708631 (FO3Launcher.exe)
  • bd33a49347ef6b175fb9bdbf2b295763e79016d6 (NtUserEx.dll)
  • f3eabaf2d7c21994cd2d79ad8a6c0acf610bbf78 (NtUserEx.dat)

With additional analysis by Jimmy Hung, Marco Dela Vega, MingYen Hsieh, Nancy Chuang, Razor Huang, Tim Yeh and Vico Fang 

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

PlugX Malware Found in Official Releases of League of Legends, FIFA Online 3

Read more: PlugX Malware Found in Official Releases of League of Legends, FIFA Online 3

Story added 19. January 2015, content source with full text you can find at link above.