Minecraft players under threat from sneaky new malware

Numerous Minecraft mods could be putting players at risk

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

TheMinecraftMalware Prevention Alliance (MMPA) has warned Minecraft players of a new vulnerability that can allow cybercriminals to run remote code and plantmalwareon victims’ devices.

Fortunately, despite being actively exploited, it is an attack that is familiar among the Java community and as such, developers are already well-informed when it comes to issuing a fix.

Not so fortunately, though, in the case of this attack, was the scale. According to MMPA, “a bad actor scanned all Minecraft servers on the IPv4 address space.” Following this, the group reckons that a malicious payload might have been deployed onto all affected servers.

Minecraft malware is widespread

Minecraft malware is widespread

The exploit, dubbed ‘BleedingPipe,’ allows full remote code execution on clients and servers running some Minecraft mods on at least versions 1.7.10/1.12.2 of Forge.

These are the best Minecraft server hosting services>Hackers are attacking Minecraft to push malware once again>Chromebooks can now run Minecraft natively, and this is great news

Among some of the known affected mods are EnderCore, LogisticsPipes, and BDLib, which have been fixed for the GT New Horizons versions. Others include Smart Moving 1.12, Brazier, DankNull, and Gadomancy.

Despite being a highly exploited vulnerability, MMPA says that no instances have been to this scale in Minecraft so far.

The group says: “We do not know what the contents of the exploit were or if it was used to exploit other clients, although this is very much possible with the exploit.”

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Server admins are urged to regularly check for suspicious files, as well as apply updates and security patches as soon as they become available in order to protect players. Players, too, can check for suspicious files, with both jSus and jNeedle being recommended scanning tools.

More broadly, maintaining effectiveendpoint protection softwareon consumer machines and being prepared is always good practice.

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

LG Electronics sets ambitious B2B revenue goal to offset declining consumer demand

New fanless cooling technology enhances energy efficiency for AI workloads by achieving a 90% reduction in cooling power consumption

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics