

The cybersecurity researcher has sufficient evidence to state that BigNox’s infrastructure server has been hijacked to host malware and suggests that the API infrastructure may have also been compromised. Still, the security researchers have found data analysis that in January 2021, the supply-chain attack was focused only on infecting Asian gamers using at least three different malware strains.ĭubbed as NightScout, the hacking group behind the operation exploited BigNox’s storage DNS and infrastructure to store and deliver the malware API infrastructure in deploying the payloads. NoxPlayer is currently used by gamers from 150 countries around the world. The unidentified threat actor hijacked the update process and infected gamers with malware.

Cybersecurity researchers have recently discovered that NoxPlayer, an Android emulation app for Windows and Mac OS made by a Hong Kong-based company BigNox was compromised via its updating mechanism.
