Interested in learning what's next for the gaming industry? Join gaming executives to discuss emerging parts of the industry this October at GamesBeat Summit Next. Register today.
Hackers can see what you’re doing in VR through a piece of malware called Big Brother. Well, sort of. There’s 171 million people worldwide using some sort of VR setup. Some of them are using Android-based systems, like Meta’s Oculus or the HTC Vive.
Those users are the ones at risk. ReasonLabs identified a new attack vector which can connect remotely to Android-based VR devices and record the headset screen. Once the malware gets into a user’s computer, it lies in wait until the user starts using a device with Developer Mode enabled.
As soon as the Big Brother malware recognizes a VR device it quietly opens up a TCP port. It then has the ability to record the user’s headset screen remotely. It can record any time the device is on the same WiFi network as the infected computer.
The recordings can then be sent out from the infected computer to the attacker, thanks to the open TCP port.
Transform 2022
In this neck of the woods we think about VR as a gaming related product. Which, sure, it is. But there are other industries out there which use VR setups for one reason or another. Healthcare, the military and manufacturers all use proprietary VR apps for training purposes. Installing those apps requires Developer Mode enabled.
All of a sudden this malware isn’t just spying, it’s engaging in corporate espionage. It’s a pretty big deal.
But back on the gaming side of things it’s not exactly safe, either. Developer Mode needs to be enabled on devices in order to install unofficial games and apps. Same thing with pirated software.
If all you’re doing with VR is
Read more on venturebeat.com