blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2
Preview meta tags from the blog.includesecurity.com website.
Linked Hostnames
6- 18 links toblog.includesecurity.com
- 3 links toincludesecurity.com
- 1 link toblog.unity.com
- 1 link todocs.unity3d.com
- 1 link toportswigger.net
- 1 link totwitter.com
Thumbnail

Search Engine Appearance
Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.
Bing
Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.
DuckDuckGo
Hacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
In my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.
General Meta Tags
9- titleHacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2022-09-13T16:00:00+00:00
- article:modified_time2022-09-13T16:04:21+00:00
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleHacking Unity Games with Malicious GameObjects, Part 2 - Include Security Research Blog
- og:descriptionIn my last post I talked about a way I found to execute arbitrary code in Unity using no custom scripts, only built-in components. This allowed potential attacks against Unity games that load AssetBundles from untrusted sources since, although AssetBundles can't include custom scripts, they can include GameObjects containing these built-in components. The attack I outlined in that blog used UnityEvents, which are primarily exposed via Unity's built-in UI elements, but the attack required user interaction to trigger. In this post I am going to discuss a zero-click method of triggering UnityEvents, along with some additional things I've learned on this topic. I will also introduce a new exploit that does not use UnityEvents and removes one of the limitations of the UnityEvent-based attack (while adding limitations of its own). Finally, I will give some updated remediation thoughts.
- og:urlhttps://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/
Twitter Meta Tags
7- twitter:cardsummary_large_image
- twitter:creator@includesecurity
- twitter:site@includesecurity
- twitter:label1Written by
- twitter:data1Jason Kielpinski
Link Tags
40- EditURIhttps://blog.includesecurity.com/xmlrpc.php?rsd
- alternatehttps://blog.includesecurity.com/feed/
- alternatehttps://blog.includesecurity.com/comments/feed/
- alternatehttps://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/feed/
- alternatehttps://blog.includesecurity.com/wp-json/wp/v2/posts/1058
Links
25- https://blog.includesecurity.com
- https://blog.includesecurity.com/2021/06/hacking-unity-games-malicious-unity-game-objects
- https://blog.includesecurity.com/2022/08/reverse-engineering-windows-printer-drivers-part-2
- https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/#respond
- https://blog.includesecurity.com/2022/09/hacking-unity-games-with-malicious-gameobjects-part-2/?share=facebook