By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: GodLoader Malware Loader: What You Need to Be Aware of | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > GodLoader Malware Loader: What You Need to Be Aware of | HackerNoon
Computing

GodLoader Malware Loader: What You Need to Be Aware of | HackerNoon

News Room
Last updated: 2025/11/01 at 6:42 PM
News Room Published 1 November 2025
Share
GodLoader Malware Loader: What You Need to Be Aware of | HackerNoon
SHARE

Security researchers at Check Point Research have published a report about GodLoader, a malware loader using Godot as its runtime to execute malicious code and infect unaware users with known malware. Based on the report, affected users thought they were downloading and executing cracks for paid software, but instead executed the malware loader.

As the report states, the vulnerability is not specific to Godot. The Godot Engine is a programming system with a scripting language. It is akin to, for instance, the Python and Ruby runtimes. It is possible to write malicious programs in any programming language. We do not believe that Godot is particularly more or less suited to do so than other such programs.

If you downloaded a Godot game or the editor from a reliable source, you don’t have to do anything. You are not at risk. We encourage people to only execute software from trusted sources – whether it’s written using Godot or any other programming system.

For some more technical details:

Godot does not register a file handler for .pck files. This means that a malicious actor always has to ship the Godot runtime (.exe file) together with a .pck file. The user will always have to unpack the runtime together with the .pck to the same location and then execute the runtime. There is no way for a malicious actor to create a “one click exploit”, barring other OS-level vulnerabilities. If such an OS-level vulnerability were used then Godot would not be a particularly attractive option due to the size of the runtime.

This is similar to writing malicious software in Python or Ruby, the malicious actor will have to ship a python.exe or ruby.exe together with their malicious program.

Good security practices

We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software.

  • Only download and execute software (including game mods) from trusted sources:
  • Official project website. Confirm it by checking the URL, and verify with a search engine that this seems to be the most frequently referenced website for this software.
  • Trusted distribution platform: Steam, Epic Games Store, Windows Store, Google Play, Apple Store, etc.
  • People you know, after confirming that they are who they claim to be if the communication is text-based (see below).
  • On Windows and macOS, verify that the executable is signed (and notarized, on macOS) by a trusted party.
  • Be wary of executing cracked software, which is a prime attack vector for malicious actors.
  • Be wary of executing software even from people you know, if you can’t confirm that their account hasn’t been compromised. A very common attack vector targeting specifically game developers is for Discord accounts to get hacked, and then malicious actors use them to send malicious downloads to their friends in private messages (“hey will you try my game?”). Make sure to confirm the identity of your contacts before executing such software.

Reporting security issues

We thank Check Point Research for following the security guidelines of responsible disclosure, which let us confirm that this attack vector, while unfortunate, is not specific to Godot and does not expose a vulnerability in the engine or for its users.

If you would like to report a security vulnerability or concern, please send an email to [email protected].


By Godot Security Team

Also published here

Photo by Ümit Yıldırım on Unsplash

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The Best Scanners We’ve Tested (November 2025) The Best Scanners We’ve Tested (November 2025)
Next Article Today's NYT Wordle Hints, Answer and Help for Nov. 2 #1597- CNET Today's NYT Wordle Hints, Answer and Help for Nov. 2 #1597- CNET
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Want to See a Magic Trick? You Can Turn on Your Computer From Across the House With Wake-on-LAN
Want to See a Magic Trick? You Can Turn on Your Computer From Across the House With Wake-on-LAN
News
watchOS 26 brings Apple Notes to your Apple Watch for the first time – 9to5Mac
watchOS 26 brings Apple Notes to your Apple Watch for the first time – 9to5Mac
News
You Can Add Apple CarPlay To Older Cars – Here’s How – BGR
You Can Add Apple CarPlay To Older Cars – Here’s How – BGR
News
Today's NYT Connections Hints, Answers for Nov. 3 #876
Today's NYT Connections Hints, Answers for Nov. 3 #876
News

You Might also Like

Linux 6.18-rc4 Released: “None Of It Looks Particularly Scary”
Computing

Linux 6.18-rc4 Released: “None Of It Looks Particularly Scary”

2 Min Read
Code Smell 313 – “Workslop” in AI-Assisted Programming | HackerNoon
Computing

Code Smell 313 – “Workslop” in AI-Assisted Programming | HackerNoon

4 Min Read
The HackerNoon Newsletter: System Design in a Nutshell (11/2/2025) | HackerNoon
Computing

The HackerNoon Newsletter: System Design in a Nutshell (11/2/2025) | HackerNoon

4 Min Read
How to Design a CLI Tool That Developers Actually Love Using | HackerNoon
Computing

How to Design a CLI Tool That Developers Actually Love Using | HackerNoon

13 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?