Genshin Impact Anticheat

Article Status Notice: This Article is a stub


This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼

Genshin Impact Anticheat
Basic Information
Release Year 2020
Product Type Video Games
In Production Yes
Official Website https://genshin.hoyoverse.com/

An introductory paragraph starting with "Genshin Impact Anticheat is a ...[1]". When writing the article, insert text in the space below this box, and then delete this tip box (and the other tip boxes below). In the visual editor, just click on a box and press backspace to delete it. In the source editor, simply delete the double curly brackets, and the text inside them.


Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.


Consumer-impact summary

edit

Overview of concerns that arise from the conduct towards users of the product:

  • Privacy: Genshin Impact Anti-cheat is a kernel level anti-cheat for a what is mostly a single player game. Genshin Impact's developers, Mihoyo, is a Chinese company headquartered in Shanhai.
  • Control: Users must have this anti-cheat running while playing the game, and after the game is finished playing.[2]
  • Access: As a kernel-level anti-cheat, the anti-cheat has the highest amount of privilege on your system.

Overview of concerns that arise from the conduct towards users of the product (if applicable):

  • User Freedom
  • User Privacy
  • Business Model
  • Market Control

Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.


Incidents

edit

Add one-paragraph summaries of incidents below in sub-sections, which link to each incident's main article while linking to the main article and including a short summary. It is acceptable to create an incident summary before the main page for an incident has been created. To link to the page use the "Hatnote" or "Main" templates.

If the company has numerous incidents then format them in a table (see Amazon for an example).


Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.


This is a list of all consumer-protection incidents related to this product. Any incidents not mentioned here can be found in the Genshin Impact Anticheat category.

Genshin Impact Anti-cheat Used to Bypass Anti-virus in Ransomware Attack (August, 2022)

edit
Main article: link to the main CR Wiki article

Genshin Impact's anti-cheat was used in a ransomware attack vector. This was originally reported on by TrendMicro. [3] During this period of vulnerability, Genshin Impact's anti-cheat was utilized to bypass anti-virus software, allowing attackers to remotely deploy ransomware payloads to an affected user's computer.

Genshin Impact's PR team, Hoyoverse PR, responded to multiple news outlets with a generic answer that seems to confirm the validity of the claims by TrendMicro. [4][5]

Example incident two (date)

edit

...


See also

edit

Link to relevant theme articles or companies with similar incidents.


Add your text below this box. Once this section is complete, delete this box by clicking on it and pressing backspace.



References

edit
  1. ref goes here
  2. "About Our Anti-Cheat System (Updated)". Genshin Impact. 2020-09-28. Archived from the original on 2023-02-01. Retrieved 2025-09-22.
  3. Soliven, Ryan (2022-08-24). "Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus". TrendMicro. Archived from the original on 2025-09-18. Retrieved 2025-09-22.
  4. Bolding, Jonathan (2022-08-28). "Ransomware abuses Genshin Impact's kernel mode anti-cheat to bypass antivirus protection". PCGamer. p. 1. Retrieved 2025-09-22.{{cite news}}: CS1 maint: url-status (link)
  5. Toulas, Bill (2022-08-25). "Hackers abuse Genshin Impact anti-cheat system to disable antivirus". Bleeping Computer. Retrieved 2025-09-22.{{cite web}}: CS1 maint: url-status (link)