Security researchers at Check Point Research have published a report about God loader. God loader is a malware loader using Godot as its runtime to execute malicious code and infect users with known malware. The Godot Engine is a programming system with a scripting language. It is possible to write malicious programs in any programming language.Security researchers at Check Point Research have published a report about God loader. God loader is a malware loader using Godot as its runtime to execute malicious code and infect users with known malware. The Godot Engine is a programming system with a scripting language. It is possible to write malicious programs in any programming language.

GodLoader Malware Loader: What You Need to Be Aware of

2025/11/02 03:00
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

Security researchers at Check Point Research have published a report about GodLoader, a malware loader using Godot as its runtime to execute malicious code and infect unaware users with known malware. Based on the report, affected users thought they were downloading and executing cracks for paid software, but instead executed the malware loader.

\ As the report states, the vulnerability is not specific to Godot. The Godot Engine is a programming system with a scripting language. It is akin to, for instance, the Python and Ruby runtimes. It is possible to write malicious programs in any programming language. We do not believe that Godot is particularly more or less suited to do so than other such programs.

\ If you downloaded a Godot game or the editor from a reliable source, you don’t have to do anything. You are not at risk. We encourage people to only execute software from trusted sources – whether it’s written using Godot or any other programming system.

\ For some more technical details:

Godot does not register a file handler for .pck files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file. The user will always have to unpack the runtime together with the .pck to the same location and then execute the runtime. There is no way for a malicious actor to create a “one click exploit”, barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.

\ This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a python.exe or ruby.exe together with their malicious program.

Good security practices

We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software.

\

  • Only download and execute software (including game mods) from trusted sources:
  • Official project website. Confirm it by checking the URL, and verify with a search engine that this seems to be the most frequently referenced website for this software.
  • Trusted distribution platform: Steam, Epic Games Store, Windows Store, Google Play, Apple Store, etc.
  • People you know, after confirming that they are who they claim to be if the communication is text-based (see below).
  • On Windows and macOS, verify that the executable is signed (and notarized, on macOS) by a trusted party.
  • Be wary of executing cracked software, which is a prime attack vector for malicious actors.
  • Be wary of executing software even from people you know, if you can’t confirm that their account hasn’t been compromised. A very common attack vector targeting specifically game developers is for Discord accounts to get hacked, and then malicious actors use them to send malicious downloads to their friends in private messages (“hey will you try my game?”). Make sure to confirm the identity of your contacts before executing such software.

Reporting security issues

We thank Check Point Research for following the security guidelines of responsible disclosure, which let us confirm that this attack vector, while unfortunate, is not specific to Godot and does not expose a vulnerability in the engine or for its users.

\ If you would like to report a security vulnerability or concern, please send an email to security@godotengine.org.


By Godot Security Team

\ Also published here

\ Photo by Ümit Yıldırım on Unsplash

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

Roll the Dice & Win Up to 1 BTC

Roll the Dice & Win Up to 1 BTCRoll the Dice & Win Up to 1 BTC

Invite friends & share 500,000 USDT!