ESET researchers have discovered that the updating mechanism of NoxPlayer, an Android emulator for Windows and macOS, made by Hong Kong-based company BigNox, was compromised by an unknown threat actor. The hacker group behind the operation dubbed NightScout compromised the company’s res06.bignox.com storage infrastructure to store the malware and the API infrastructure to deploy the payloads. ESET found that the supply-chain attack was focused on infecting only Asian gamers with at least three different malware strains.
Source: https://www.bleepingcomputer.com/news/security/android-emulator-supply-chain-attack-targets-gamers-with-malware/

