blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects

Preview meta tags from the blog.includesecurity.com website.

Linked Hostnames

9

Thumbnail

Search Engine Appearance

Google

https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects

Hacking Unity Games with Malicious GameObjects - Include Security Research Blog

The Unity game engine provides various means for getting external assets into a game, such as AssetBundles, for adding assets at runtime and the Asset Store, for purchasing third-party assets. It’s possible for a GameObject to execute arbitrary code using no custom scripts, only components that are available by default in Unity. If the game uses Bolt or another visual scripting system, there are even more paths to code execution. In this blog I will cover how a malicious GameObject might get into a game, two specific methods I’m aware of for the GameObject to execute code, and possible ways to mitigate the risk.



Bing

Hacking Unity Games with Malicious GameObjects - Include Security Research Blog

https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects

The Unity game engine provides various means for getting external assets into a game, such as AssetBundles, for adding assets at runtime and the Asset Store, for purchasing third-party assets. It’s possible for a GameObject to execute arbitrary code using no custom scripts, only components that are available by default in Unity. If the game uses Bolt or another visual scripting system, there are even more paths to code execution. In this blog I will cover how a malicious GameObject might get into a game, two specific methods I’m aware of for the GameObject to execute code, and possible ways to mitigate the risk.



DuckDuckGo

https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects

Hacking Unity Games with Malicious GameObjects - Include Security Research Blog

The Unity game engine provides various means for getting external assets into a game, such as AssetBundles, for adding assets at runtime and the Asset Store, for purchasing third-party assets. It’s possible for a GameObject to execute arbitrary code using no custom scripts, only components that are available by default in Unity. If the game uses Bolt or another visual scripting system, there are even more paths to code execution. In this blog I will cover how a malicious GameObject might get into a game, two specific methods I’m aware of for the GameObject to execute code, and possible ways to mitigate the risk.

  • General Meta Tags

    9
    • title
      Hacking Unity Games with Malicious GameObjects - Include Security Research Blog
    • charset
      UTF-8
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • article:published_time
      2021-06-09T17:01:05+00:00
    • article:modified_time
      2021-06-10T03:19:04+00:00
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Hacking Unity Games with Malicious GameObjects - Include Security Research Blog
    • og:description
      The Unity game engine provides various means for getting external assets into a game, such as AssetBundles, for adding assets at runtime and the Asset Store, for purchasing third-party assets. It’s possible for a GameObject to execute arbitrary code using no custom scripts, only components that are available by default in Unity. If the game uses Bolt or another visual scripting system, there are even more paths to code execution. In this blog I will cover how a malicious GameObject might get into a game, two specific methods I’m aware of for the GameObject to execute code, and possible ways to mitigate the risk.
    • og:url
      https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects/
  • Twitter Meta Tags

    7
    • twitter:card
      summary_large_image
    • twitter:creator
      @includesecurity
    • twitter:site
      @includesecurity
    • twitter:label1
      Written by
    • twitter:data1
      IncludeSec
  • Link Tags

    38
    • EditURI
      https://blog.includesecurity.com/xmlrpc.php?rsd
    • alternate
      https://blog.includesecurity.com/feed/
    • alternate
      https://blog.includesecurity.com/comments/feed/
    • alternate
      https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects/feed/
    • alternate
      https://blog.includesecurity.com/wp-json/wp/v2/posts/252

Links

39