Steam Invites and TF2 Community Servers May Have Been Used to Hijack PCs, Hack Hunters Claim

General
Steam Invites and TF2 Community Servers May Have Been Used to Hijack PCs, Hack Hunters Claim

Exploits Lurking in Source Engine Games Like "Team Fortress 2" and "Counter-Strike:" A nonprofit reverse engineering group revealed this weekend that hackers have been able to remotely access Source Engine games like Team Fortress 2 and Counter-Strike:. Global Offensive, and other Source Engine games, hackers could gain remote access to players' PCs for years.

In a series of tweets, the Secret Club revealed that all Source games have a remote code execution flaw that can be launched via a Steam invite or community server; in an email to RPS, the Secret Club said the exploit gives attackers to "take complete control of the victim's system and can be used to steal passwords, banking information, etc."

And most disconcerting of all, the exploit is still considered valid, and despite discovering one instance two years ago, the Secret Club claims that Valve is trying to prevent it from sharing its knowledge publicly.

Other similar cases of this exploit (such as this CS:GO) are more recent. However, it has been several months since we reported this issue to Valve, and according to members of the Secret Club, Valve has yet to acknowledge the problem.

Concerns of a Source Engine security breach were raised last April when the source code for TF2 and CS:GO was leaked, revealing a potential remote code execution exploit. At the time, Valve explained that the leaks were actually "limited" builds from 2017-18 and that players were not at risk.

"This review has found no reason for players to be wary or avoid the current build (as always, we recommend playing on official servers for maximum security)," Valve said in a statement to PC Gamer at the time.Valve issued a statement to PC Gamer at the time, stating, "We continue to investigate the situation and will report back to the press and players if we find anything that proves otherwise."

We contacted Valve for comment on these latest exploits.

Categories