Current Source Engine Server Exploit - Proceed with Caution, Mr. Freeman.

Hey everyone.

I hate having to write posts like this, but I’ve had a few people come to me over the past few days warning me about a new Source Engine Server exploit that is making the rounds across various games. There has been some reports that Black Mesa MP Servers could be the target of the exploit, if someone with malicious intent wants it to. Until Valve (and then us) patch a fix in, I’ve made this post to inform everyone of potential danger and steps on how to avoid infection.

What is the exploit?
I don’t want to go into details on how to replicate the exploit, but I will say what it does, as I understand it. If you load up into an infected Source Server, the exploit allows the server to inject a file into your computers start up folder. You won’t know this happens. When you launch your computer again (ie, it starts up again) the file will be executed and bad stuff happens. This exploit/infection can only occur if the server is set up to do it, that is someone needs to set up the server to cause it to happen.

How do I know if a server is infected?
As far as I know, there is nothing that says “THIS SERVER IS INFECTED!” I don’t know of any current ways to check. Your best bet is to make sure that you are connecting to our official servers, or servers where you know that the server host has personally checked to make sure the exploit is not active. A list of our official servers are listed below, with IP. Additionally, when you connect to a server, connect to it directly via IP, not via the server browser list.

What can I do to prevent getting hit by this exploit?
Like I mentioned before, only connect to trusted servers via the console command “connect .” Additionally, make sure that the server you’re connected to is trusted to not be infected and if you can check with the server admin to check, that is even better. Since it’s very easy to make a server with the same name as your favourite server, this will ensure that you are connecting to the server you want to connect to. Also, check to see if the server you’re connecting to has a name that is an exact copy. If there are two servers with the same name, it’s possible that one could be infected. Use caution or avoid the server entirely.

What should I do if I think I’ve been infected?
Immediately run a virus scan. There are many free antivirus scanners online. I personally have used AVG and Avast! but if you have a favourite, then you can use that. Additionally check your start up folder to make sure that any files in there are not suspicious or malicious.

While we all know that Black Mesa has the biggest MP population of any MP game ever (that was sarcasm and a joke, by the way), we can make sure everyone stays safe. If everyone is vigilant and careful with the servers they connect to, follow the steps I’ve provided above and just use a little bit of common sense, no one will be infected.

If you have any questions, please ask them in this thread.

- Joe

Full list of Official, Crowbar Collective Black Mesa Multiplayer Servers:
New York City:
nyc3.game.blackmesagame.com:27015 - Deathmatch
nyc3.game.blackmesagame.com:27016 - Team Deathmatch
nyc2.game.blackmesagame.com:27015 - Deathmatch (Beta)
nyc2.game.blackmesagame.com:27016 - Team Deathmatch (Beta)

San Francisco:
sfo1.game.blackmesagame.com:27015 - Deathmatch
sfo1.game.blackmesagame.com:27016 - Team Deathmatch

London:
lon1.game.blackmesagame.com:27015 - Deathmatch
lon1.game.blackmesagame.com:27016 - Team Deathmatch

Amsterdam:
ams2.game.blackmesagame.com:27015 - Deathmatch
ams2.game.blackmesagame.com:27016 - Team Deathmatch

1 Like

Jeez, feels like this is the 5th Source exploit discovered in the last year. I hope Source 2 and its games are much more secure, not that we’re getting any of those anytime soon.
Thanks for the heads-up.

Nice! Now our server will be empty! BMMP is popular? No its not! Bcs tau gun is inbalance!

https://i.imgur.com/0cCCl.jpg

★ U N I T E D - G A M E R S ★ [EU]
Official IP: 31.186.250.106:27070

Any news regarding this server can be found here

Pay attention what servers you connect to as they may be set up to impersonate other servers & drop malware on to connected clients that think they are joining the legit server.

Great job posting about this to warn users.

Edit:
I had a chat some days ago with Leystryku (the guy who found this exploit & others) and Steam ID spoofing being possible came into discussion, why do i mention this you ask ?

Because 99% of servers only use Steam ID’s to authenticate admins.

A previously legit / trusted server could be compromised by someone spoofing the Steam ID of a root admin and modifying the previously clean server to distribute malware to its users.

Official Black Mesa servers are not affected by this as they do not run any admin mods as far as i am aware, community servers however can be targeted.

United Gamers has & will always have its security & the security of it’s players as an absolute top priority.

If you run game servers & care about your user’s security, please add password authentication for all the admins on your server.

I’ve also posted about this here some days ago in case its of any use. https://steamcommunity.com/app/362890/discussions/0/412447613578762469/#c412448158140436412

If I’m not mistaken, Dota 2 is actually on Source 2 right now. There was an update at some point back in 2015 which did this.

Has there been an article written about it somewhere? Other than here I haven’t seen anything. I know the exploit itself is old, but it’s only been on other forums that I’ve seen any evidence of this.

Well, yeah, but I mean games that matter.

and

https://np.reddit.com/r/pcgaming/comments/46uz6f/psa_flaws_in_sourceengine_games_allow_malicious/

and

https://facepunch.com/showthread.php?t=1507128

and

https://www.reddit.com/r/Steam/comments/46px2w/psa_steamid_spoofing_on_every_steam_product_and/


This is around 1 week old at this time, doesn’t have anything to do with exploits doing the same thing from a few months ago, they are different exploits.

One could also remove the write permissions to ‘shell :s tartup’ and ‘shell:common startup’. I don’t see why windows would allow anything to be copied there if not even the system has permission to write to that folder.

Are there any fixes for this so far from Valve?

Is this still an issue? I have no idea if it was fixed or not.

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.