On October 3, the Unity game platform is quietly rolling out a fix patch to address a vulnerability. This vulnerability allows third-party code to run in Android-based mobile games, potentially targeting mobile encryption wallets. Sources say that the affected projects can be traced back as early as 2017. Although the vulnerability primarily affects the Android system, Windows, macOS, and Linux systems are also impacted to varying degrees. Unity has begun privately distributing fix tools and standalone patch tools to select partners, and official public guidance is expected to be released next Monday or Tuesday, according to sources. This threat is described by sources as "in-process code injection," but it has not been confirmed whether devices could be completely taken over as a result. However, they noted that under certain conditions, this path could escalate to a device-level full compromise on Android devices. Even without full device access, malicious code may attempt "interface overlay, input capture, or screen capture" to steal personal credentials or encryption wallet mnemonic phrases.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
The game engine Unity has a vulnerability on the Android side, which may affect Android encryption users' Wallet.
On October 3, the Unity game platform is quietly rolling out a fix patch to address a vulnerability. This vulnerability allows third-party code to run in Android-based mobile games, potentially targeting mobile encryption wallets. Sources say that the affected projects can be traced back as early as 2017. Although the vulnerability primarily affects the Android system, Windows, macOS, and Linux systems are also impacted to varying degrees. Unity has begun privately distributing fix tools and standalone patch tools to select partners, and official public guidance is expected to be released next Monday or Tuesday, according to sources. This threat is described by sources as "in-process code injection," but it has not been confirmed whether devices could be completely taken over as a result. However, they noted that under certain conditions, this path could escalate to a device-level full compromise on Android devices. Even without full device access, malicious code may attempt "interface overlay, input capture, or screen capture" to steal personal credentials or encryption wallet mnemonic phrases.