Connect with us

Crypto World

Kaspersky flags RenEngine loader spread via pirated software

Published

on

Crypto Breaking News

Editor’s note: In the ongoing battle against malware, RenEngine’s reach underscores how attackers exploit trusted software channels to broaden their victim base. Today’s briefing from Kaspersky Threat Research highlights a multi-stage infection that pivots beyond gaming into widely used cracked productivity tools. The findings emphasize the importance of verifying software sources and maintaining updated defenses across personal and corporate environments. As cyber threats increasingly blend with legitimate workflows, readers should review security practices, stay vigilant about unofficial installers, and consider how threat actors opportunistically adapt to new distribution methods. This update offers context for executives, IT teams, and security professionals navigating a rapidly evolving threat landscape.

Key points

  • RenEngine loader is distributed via dozens of pirated software sites, not just cracked games.
  • Final payloads include Lumma, ACR Stealer, and Vidar in various infection chains.
  • The distribution pattern is opportunistic and regional rather than targeted.
  • The campaign uses Ren’Py-based game installers with fake loading screens to deploy malware

Why this matters

The expansion from gaming to cracked productivity software widens the potential victim pool and raises risk for individuals and organizations. Attackers use multi-stage delivery, anti-analysis checks, and broad distribution to bypass defenses. Organizations should reinforce software provenance checks, user education, and behavior-based detection to identify malicious activity masquerading as legitimate software.

What to watch next

  • Watch for new distribution sites or bundles carrying RenEngine via cracked software.
  • Monitor for updates from security vendors on HijackLoader-based campaigns across multiple payloads.
  • Track any new payload families linked to RenEngine or related loaders.

Disclosure: The content below is a press release provided by the company/PR representative. It is published for informational purposes.

Kaspersky identifies RenEngine loader distributed through pirated games and software

Kaspersky identifies RenEngine loader distributed through pirated games and software

February 23, 2026

Kaspersky Threat Research has revealed its analysis of RenEngine, a malware loader that has recently gained public attention. Kaspersky identified RenEngine samples as early as March 2025, with its solutions already protecting users from the threat at that time.

Advertisement

Beyond the cracked games highlighted in recent reports, Kaspersky researchers discovered that attackers created dozens of websites distributing RenEngine through pirated software, including graphics editors like CorelDRAW. This expands the known attack surface beyond the gaming community to anyone seeking unlicensed software.

Kaspersky has recorded incidents in Russia, Brazil, Turkey, Spain and Germany, among other countries. The distribution pattern indicates opportunistic attacks rather than targeted operations.

When Kaspersky first identified RenEngine, the loader was delivering the Lumma stealer. Current attacks distribute ACR Stealer as the final payload, and Vidar stealer has also been observed in some infection chains.

The campaign exploits modified versions of games built on the Ren’Py visual novel engine. When users launch infected installers, a fake loading screen appears while malicious scripts execute in the background. The scripts include sandbox detection capabilities and decrypt a payload that initiates a multi-stage infection chain using HijackLoader, a modular malware delivery tool.

Advertisement

“This threat extends beyond pirated games — attackers are using the same technique to distribute malware through cracked productivity software, which broadens the potential victim pool significantly.”

— Pavel Sinenko, lead malware analyst at Kaspersky Threat Research

“Game archive formats vary by engine and title. If an engine doesn’t check the integrity of its resources, attackers can embed malware that executes the moment you click play.”

Kaspersky solutions detect RenEngine as Trojan.Python.Agent.nb and HEUR:Trojan.Python.Agent.gen. HijackLoader is detected as Trojan.Win32.Penguish and Trojan.Win32.DllHijacker.

To stay protected, Kaspersky recommends:

Advertisement
  • Download games and software only from official sources. Pirated content remains one of the most common malware delivery methods.
  • Use a reliable security solution. Kaspersky Premium protects against threats like RenEngine through its Behavior Detection component, which identifies malicious activity even when malware is disguised as legitimate software.
  • Keep your operating system and applications updated to ensure known vulnerabilities are patched.
  • Be skeptical of “free” offers. If a paid game or software is available for free download on an unofficial site, the cost is likely your security.

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company’s comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and nearly 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Crypto World

Chainlink’s 86% Correction May Be Over: Here’s Why $100 Could Be Next for LINK

Published

on

Nexo Partners with Bakkt for US Crypto Exchange and Yield Programs

TLDR:

  • LINK has corrected over 86% from its 2021 high near $53, now compressing inside a key demand block at $5.60–$7.50.
  • CryptoPatel identifies smart money absorption at macro support, with sell-side liquidity sweeps fully absorbed on the 3W chart.
  • Three upside price targets are mapped at $26.30, $52.22, and $100, representing up to 1,675% return from the demand zone.
  • The bullish setup is invalidated if LINK prints a three-weekly candle close below the critical support level of $4.76.

Chainlink’s native token, LINK, is currently priced around $8.30 after an extended period of price compression. Analyst CryptoPatel has released a high-timeframe technical forecast pointing toward a potential 10x move.

The setup is built on multi-year chart structure and accumulated demand at macro support. With volatility contracting sharply on the three-weekly chart, market participants are watching closely for a breakout confirmation.

LINK Accumulates Inside a Multi-Year Demand Block

LINK has been trading inside a descending channel on the three-weekly chart since its 2021 cycle high near $53. The token corrected more than 86% from that peak over the following years.

Price has since compressed into a demand block between $5.60 and $7.50. This zone is where CryptoPatel identifies strong smart money absorption taking place.

Multiple higher lows have formed within this demand block on the higher timeframe. Each successive low reflects buyers stepping in before price reaches prior lows.

Advertisement

CryptoPatel noted that sell-side liquidity sweeps into this support region have been fully absorbed. That behavior points toward sustained accumulation rather than distribution at current levels.

The analyst’s tweet reads: “Fractal Structure Mirroring Previous Cycle Compression Before Breakout.” This observation draws a direct parallel to prior accumulation phases in LINK’s price history.

Advertisement

Each of those phases was followed by a sharp directional expansion. The current setup carries a structurally similar pattern on the same timeframe.

Volatility on the three-weekly chart has contracted to an extreme degree, according to CryptoPatel. That level of compression typically precedes a larger expansion move in either direction.

Price is currently hovering near $8, described as range equilibrium within the analyst’s framework. The descending channel resistance from the 2021 all-time high remains the defining technical ceiling.

Key Price Levels That Could Trigger a Massive Upside Move

CryptoPatel has mapped out three upside targets: $26.30, $52.22, and $100. A move to the third target from current prices would represent a gain of approximately 1,110%.

Advertisement

The projected total return from the high-timeframe demand zone sits between 1,232% and 1,675%. These targets align with liquidity pools resting above current price on the higher timeframe chart.

The critical confirmation signal for this setup is a three-weekly candle close above the descending trendline resistance. A simultaneous break of the range high on that timeframe would further strengthen the bullish case.

Until that close materializes, the channel resistance remains structurally intact. Traders following this setup are waiting for that specific trigger before adding exposure.

CryptoPatel’s bullish bias holds as long as LINK stays above $4.76 on the three-weekly timeframe. That level marks the lower boundary of the high-timeframe demand zone.

Advertisement

A confirmed candle close below $4.76 would signal structural failure and open the door to further downside. That threshold functions as the hard invalidation point for the entire setup.

The analyst describes this as a high-timeframe, patience-based trade with asymmetric risk-to-reward. It is best suited for spot accumulation and long-term swing positioning, per the forecast.

No macroeconomic or fundamental variables are incorporated into the analysis. Traders are encouraged to conduct independent research before making any financial decisions.

Advertisement

Source link

Continue Reading

Crypto World

Backpack Offers 20% Equity to Token Stakers Ahead of IPO

Published

on

Backpack Offers 20% Equity to Token Stakers Ahead of IPO

Crypto trading platform Backpack Exchange on Monday announced that stakers of its forthcoming Backpack token will be able to earn equity in the exchange, as the company moves toward a potential initial public offering.

“Users that stake the Backpack token for at least a year will have the opportunity to exchange those tokens for equity at a fixed ratio—20% of the company today,” said Backpack CEO and founder Armani Ferrante in a post to X on Monday.

Speaking about the equity offering, Ferrante said many past token launches were built on “false promises” of utility — a pitfall he wanted to avoid. Instead, he said he wanted to offer users an alternative token structure showing long-term commitment.

“I came into crypto because I believe it’s going to change the world … But somewhere along the way, amidst the booms, the busts, the moonshots, the decentralization theater, and the straight up scams, we lost our way. I don’t know about you, but I’m just tired of false promises.”

Backpack’s offer would anchor the token’s value to company equity.

Backpack prioritizes users with tokenomics setup

Backpack first announced it would launch the Backpack token in a post on X earlier this month. 

Advertisement

The tokens are intended to be unlocked in stages as the company moves toward a potential US IPO.

Backpack said 25% of the 1 million-token supply will be unlocked at the Token Generation Event, while the next 37.5% of the tokens will be released before the IPO, provided that Backpack reaches certain milestones, such as regulatory approvals and the launch of new products.