Jump to content

Genshin Impact: Difference between revisions

From Consumer Rights Wiki
Dginovker (talk | contribs)
Add Genshin Impact with the famous anticheat ransomware example
 
Bananabot (talk | contribs)
Added archive URLs for 2 citation(s) using CRWCitationBot
 
(16 intermediate revisions by 8 users not shown)
Line 1: Line 1:
Genshin Impact is an open world battle game developed by MiHoYo.
{{ProductCargo
|ArticleType=Product
|Category=Video Games
|Company=MiHoYo
|Description=
|InProduction=Yes
|Logo=Genshin Impact.png
|ProductLine=
|ReleaseYear=2020
|Website=https://genshin.hoyoverse.com/
}}
'''{{wplink|Genshin Impact|Genshin Impact}}''' is an ''[[Digital_rights_management#Always-online_DRM|always online]]'' open world free-to-play action role-playing {{wplink|Gacha game|gacha}} video game developed by {{wplink|MiHoYo|MiHoYo}}.


== Incidents ==
==Consumer impact summary==


Genshin Impact uses kernel-level (Ring 0) anticheat, which provides full access to system resources. In 2022, the anticheat driver mhyprot2.sys was used by hackers to bypass all privileges and deliver ransomware<ref>https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html</ref>.
*'''Privacy:''' Genshin Impact despite primarily being a single player title with some co-op elements utilises [[Kernel level anti-cheats|kernel level anti-cheat]].
*'''Control:''' Users must have the anti-cheat running while playing the game. Prior to a September 2020 update, it also remained running after the game was closed or uninstalled.<ref>{{Cite web |date=28 Sep 2020 |title=About Our Anti-Cheat System (Updated) |url=https://genshin.hoyoverse.com/en/news/detail/103720 |url-status=live |archive-url=https://web.archive.org/web/20230201114443/https://genshin.hoyoverse.com/en/news/detail/103720 |archive-date=1 Feb 2023 |access-date=22 Sep 2025 |website=Genshin Impact}}</ref>
*'''Security:''' Kernel level anti-cheats, have the highest amount of privilege on the running machine — and the greatest vulnerability should it be hacked.
 
==Incidents==
 
===Genshin Impact anti-cheat used to bypass anti-virus in ransomware attack (''August 2022'')===
In 2022, Genshin Impact's anti-cheat was used in a {{Wplink|ransomware}} attack vector. This was originally reported on by TrendMicro.<ref>{{Cite web |last=Soliven |first=Ryan |date=24 Aug 2022 |title=Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus |url=https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html |url-status=live |archive-url=https://web.archive.org/web/20250918100139/https://www.trendmicro.com/en_us/research/22/h/ransomware-actor-abuses-genshin-impact-anti-cheat-driver-to-kill-antivirus.html |archive-date=18 Sep 2025 |access-date=22 Sep 2025 |website=TrendMicro}}</ref> During this period of vulnerability, Genshin Impact's anti-cheat was utilized to bypass anti-virus software, allowing attackers to remotely deploy ransomware payloads to an affected user's computer.
 
Genshin Impact's public relations team, Hoyoverse PR, responded to multiple news outlets with a generic answer that seemed to confirm the validity of the claims by TrendMicro.<ref>{{Cite news |last=Bolding |first=Jonathan |date=28 Aug 2022 |title=Ransomware abuses Genshin Impact's kernel mode anti-cheat to bypass antivirus protection |url=https://www.pcgamer.com/ransomware-abuses-genshin-impacts-kernel-mode-anti-cheat-to-bypass-antivirus-protection/ |url-status=live |access-date=22 Sep 2025 |work=PCGamer |pages=1 |archive-url=http://web.archive.org/web/20251207123959/https://www.pcgamer.com/ransomware-abuses-genshin-impacts-kernel-mode-anti-cheat-to-bypass-antivirus-protection/ |archive-date=7 Dec 2025}}</ref><ref>{{Cite web |last=Toulas |first=Bill |date=25 Aug 2022 |title=Hackers abuse Genshin Impact anti-cheat system to disable antivirus |url=https://www.bleepingcomputer.com/news/security/hackers-abuse-genshin-impact-anti-cheat-system-to-disable-antivirus/ |url-status=live |access-date=22 Sep 2025 |website=Bleeping Computer |archive-url=http://web.archive.org/web/20251012172846/https://www.bleepingcomputer.com/news/security/hackers-abuse-genshin-impact-anti-cheat-system-to-disable-antivirus/ |archive-date=12 Oct 2025}}</ref>
 
==Further reading==
*[[Kernel level anti-cheats]]
 
==References==
{{Reflist}}
 
[[Category:{{PAGENAME}}]]

Latest revision as of 05:10, 23 February 2026

Genshin Impact
Basic Information
Release Year 2020
Product Type Video Games
In Production Yes
Official Website https://genshin.hoyoverse.com/

Genshin Impact is an always online open world free-to-play action role-playing gacha video game developed by MiHoYo.

Consumer impact summary

[edit | edit source]
  • Privacy: Genshin Impact despite primarily being a single player title with some co-op elements utilises kernel level anti-cheat.
  • Control: Users must have the anti-cheat running while playing the game. Prior to a September 2020 update, it also remained running after the game was closed or uninstalled.[1]
  • Security: Kernel level anti-cheats, have the highest amount of privilege on the running machine — and the greatest vulnerability should it be hacked.

Incidents

[edit | edit source]

Genshin Impact anti-cheat used to bypass anti-virus in ransomware attack (August 2022)

[edit | edit source]

In 2022, Genshin Impact's anti-cheat was used in a ransomware attack vector. This was originally reported on by TrendMicro.[2] During this period of vulnerability, Genshin Impact's anti-cheat was utilized to bypass anti-virus software, allowing attackers to remotely deploy ransomware payloads to an affected user's computer.

Genshin Impact's public relations team, Hoyoverse PR, responded to multiple news outlets with a generic answer that seemed to confirm the validity of the claims by TrendMicro.[3][4]

Further reading

[edit | edit source]

References

[edit | edit source]
  1. "About Our Anti-Cheat System (Updated)". Genshin Impact. 28 Sep 2020. Archived from the original on 1 Feb 2023. Retrieved 22 Sep 2025.
  2. Soliven, Ryan (24 Aug 2022). "Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus". TrendMicro. Archived from the original on 18 Sep 2025. Retrieved 22 Sep 2025.
  3. Bolding, Jonathan (28 Aug 2022). "Ransomware abuses Genshin Impact's kernel mode anti-cheat to bypass antivirus protection". PCGamer. p. 1. Archived from the original on 7 Dec 2025. Retrieved 22 Sep 2025.
  4. Toulas, Bill (25 Aug 2022). "Hackers abuse Genshin Impact anti-cheat system to disable antivirus". Bleeping Computer. Archived from the original on 12 Oct 2025. Retrieved 22 Sep 2025.