A potential security breach has emerged within Minecraft, with an apparent Remote Code Execution (RCE) hack affecting servers that have certain mods enabled. This poses a significant risk to players who engage with these compromised servers. Although the exact scope of the hack remains uncertain, the Minecraft community is actively warning players about the potential dangers.
The Minecraft Malware Prevention Alliance (MMPA) has identified the vulnerability, called "Bleeding Pipe," which impacts specific players depending on the mods and mod packs they use. Versions 1.7.10 and 1.12.2 of Minecraft mod packs are particularly susceptible, but any version can be affected if a compromised mod is installed. The MMPA cautions that detecting this attack is challenging due to the unknown content of the payload sent to vulnerable servers. Nonetheless, they suggest a few potential detection methods.
The MMPA has listed several vulnerable mods in their "Bleeding Pipe" post, and a German computer science student known as 'DogBoy21' on GitHub has identified approximately three dozen popular mods vulnerable to this hack.
Due to the gravity of the vulnerability, the MMPA strongly advises against using unpatched mods. If you have been playing on servers that utilize the affected mods, the MMPA recommends taking precautions such as performing an antivirus scan, checking for suspicious files, scanning your .minecraft directory with tools like jSus or jNeedle, or installing their mod PipeBlocker.
The situation has garnered attention from PCGamesN, which has reached out to Mojang for a statement. In the meantime, it's essential for players to prioritize their safety by following the provided guidelines and considering reliable Minecraft cheats and console commands for secure gameplay. Additionally, players can explore the best Minecraft seeds in version 1.20 for an enhanced gaming experience.
Comments