blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2

Preview meta tags from the blog.includesecurity.com website.

Linked Hostnames

6

Thumbnail

Search Engine Appearance

Google

https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2

Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog

In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.



Bing

Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog

https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2

In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.



DuckDuckGo

https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2

Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog

In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.

  • General Meta Tags

    9
    • title
      Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
    • charset
      UTF-8
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • article:published_time
      2022-09-13T16:00:00+00:00
    • article:modified_time
      2022-09-13T16:04:21+00:00
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
    • og:description
      In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.
    • og:url
      https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/
  • Twitter Meta Tags

    7
    • twitter:card
      summary_large_image
    • twitter:creator
      @includesecurity
    • twitter:site
      @includesecurity
    • twitter:label1
      Written by
    • twitter:data1
      Jason Kielpinski
  • Link Tags

    40
    • EditURI
      https://blog.includesecurity.com/xmlrpc.php?rsd
    • alternate
      https://blog.includesecurity.com/feed/
    • alternate
      https://blog.includesecurity.com/comments/feed/
    • alternate
      https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/feed/
    • alternate
      https://blog.includesecurity.com/wp-json/wp/v2/posts/1058

Links

25