Dark Souls 3 exploit could allow hackers to take over your entire computer

A dangerous Remote Code Execution (RCE) exploit found in dark souls 3 could let a bad actor take control of your computer, according to a report by Dexerto. The vulnerability only endangers PC gamers who play online and can potentially affect dark souls, dark souls 2, and the next Ring of Elden.

The exploit was seen in action during The__Grim__Sleeper’s Twitch stream. dark souls 3 in line. At the end of the stream (1:20:22), The__Grim__Sleeper’s game crashes, and the robotic voice belonging to Microsoft’s text-to-speech generator suddenly begins to criticize his gameplay. The__Grim__Sleeper then reports that Microsoft PowerShell opened on its own, indicating that a hacker used the program to run a script that triggered the text-to-speech feature.

However, it probably wasn’t a malicious hacker – a message captured on SpeedSouls’ Discord may reveal the “hacker’s” true intentions. According to the message, the “hacker” was aware of the vulnerability and attempted to contact dark souls FromSoftware developer about the problem. He was reportedly ignored, so he started using the hack on streamers to draw attention to the issue.

But if a bad actor had discovered this problem first, the result could have been much worse. RCE is one of the most dangerous vulnerabilities, as noted by Kaspersky. It allows hackers to execute malicious code on their victim’s computer, causing irreparable damage and potentially stealing sensitive information while they’re there.

Blue Sentinel, a community-created anti-cheat mod for dark souls 3, has since been patched to protect against the RCE vulnerability. In a post on the r/darksouls3 subreddit, a user explains that (hopefully) only four people know how to run the RCE hack – two of whom are Blue Sentinel developers, and the other two are people “who worked on it” , possibly referring to the people who helped discover the problem.

For now, though, it’s probably best to stay away. dark souls online until an official patch is released. A Bandai Namco representative commented on a Reddit post in response to the issue, stating, “Thank you very much for the ping, a report on this matter was submitted to the relevant internal teams earlier today, the information is much appreciated!” The edge contacted Bandai Namco with a request for comment but did not immediately respond.

Previous CISA adds 17 vulnerabilities to list of bugs exploited in attacks
Next To err is human, and that's what hackers rely on