Looking into Roblox "Malware"

Поділитися
Вставка
  • Опубліковано 24 січ 2025

КОМЕНТАРІ • 356

  • @Hoofer
    @Hoofer  15 днів тому +83

    I will be doing some more videos on similar backdoors that are more obfuscated soon! If anybody has any samples they found that they'd like me to look at, let me know.

    • @Nullthropy
      @Nullthropy 15 днів тому +4

      you found out my module :((((

    • @GabrielSdx
      @GabrielSdx 15 днів тому +4

      goofert 👽🙏 vlorp glormo 👽🔥🔥🙏

    • @Sown.
      @Sown. 14 днів тому +2

      More obfuscated backdoors are going to be virtualized, I doubt you would be able to devirtualize it or even constant dump the code

    • @Hoofer
      @Hoofer  14 днів тому +6

      @@Sown. I actually did in my latest video!

    • @jadedplover1851
      @jadedplover1851 9 днів тому +2

      I'm a cybersecurity grad and i can maybe help answer why there seem to be "red herrings" and so many weird HTTP requests compounding on each other, generally what happens is that instead of making their own assets from scratch blackhats will go around finding pre-existing malicious assets and add their own payloads to it then reupload it back, sometimes they might remove other peoples payloads too or break some other malicious parts of code which is also why there seem to be multiple different games from different creators connected to the same asset. Generally though it's seen to them as "good manners" to leave other payloads intact when you add your own.

  • @tperm7282
    @tperm7282 15 днів тому +138

    i find it funny how they say "you cant look through this script because its blah blah blahs property" halfway through the dissection process

  • @shadywashere
    @shadywashere 14 днів тому +96

    As an experienced developer on the platform, back then there wasn’t a way to confirm if you wanted to remove scripts from models coming from toolbox. You had to manually check which at the time most didn’t.

  • @Azadzy
    @Azadzy 15 днів тому +142

    Oh My God. You LEAKED their executor, you EXPOSED them for spying, you are a BEAST

    • @Sumthing8U
      @Sumthing8U 13 днів тому +9

      a mr. beast..

    • @Hann28e7
      @Hann28e7 12 днів тому

      ​@@Sumthing8Uboo 💀👎

  • @TheMadIrishDev
    @TheMadIrishDev 15 днів тому +194

    one time I took a water block out of the toolbox, and I checked the script in it. And it was like 300 lines of printing "you have been hacked by XASDWADFSAFSA etc."

    • @arvt_
      @arvt_ 13 днів тому

      players beware! dont press f9!!! you wil get hacked!!!

    • @sewziom3396
      @sewziom3396 13 днів тому +13

      Loops: exist
      water blocks on toolbox hacker creators

    • @AGSTER
      @AGSTER 13 днів тому +8

      I got baited to same script but in lava block in 2013-ish, my obby didnt do well.

    • @крутойперчик
      @крутойперчик 6 днів тому

      @@sewziom3396 loops good but there will be automatic roblox script exhausted timeout or smth like that and loop will stop

    • @reapimuhs
      @reapimuhs 5 днів тому +2

      @@крутойперчик all you need to do to evade that timeout error is to have it yield every x amount of iterations.

  • @superflyboy8732
    @superflyboy8732 16 днів тому +279

    I REMEMBER SEEING THE "Player:Move called but the player has no humanoid" THING SPAMMED IN GAMES WHEN I PRESS F9

    • @Bolaside
      @Bolaside 16 днів тому +46

      yeah it's not a rare warning though, might be a faulty script too

    • @HL2Modder2001
      @HL2Modder2001 16 днів тому +48

      I think that's a masking something with a Roblox error, which that output is as "Player:Move called but the player has no humanoid" only triggers if you try to move your character using Player:Move() but you do not have a Humanoid object in your character for some reason
      Ofc in this case, it's fake and more a mask but the error is a real error

    • @baconheadhair6938
      @baconheadhair6938 15 днів тому +2

      @HL2Modder2001Well yeah, all errors are real errors

    • @adrian-pr4tn
      @adrian-pr4tn 15 днів тому +10

      thats on the client they spam it on server

    • @carlthesillyroblox
      @carlthesillyroblox 15 днів тому

      if you check your code and it has no malware then its an real error where when you try to move but your character model has no humanoid

  • @Zye_Clips
    @Zye_Clips 16 днів тому +166

    Thats crazy as a scripter myself it was fascinating to see the amount of trouble they went through they really thought outside the box for some of the stuff a lot of scripters probably would have missed some of the stuff u pointed, especially beginner scripters who just wanted to use a free asset from the tool box. Good Video i really enjoyed watching it.

    • @BMWe-ed2tn
      @BMWe-ed2tn 16 днів тому +17

      I dont use roblox but as a coder anytime i see obfuscated code i find another source or write my own.

    • @AlreadyCode
      @AlreadyCode 15 днів тому +1

      @@BMWe-ed2tn yeah same.

    • @Sown.
      @Sown. 14 днів тому +2

      It's really basic tho?

    • @Zye_Clips
      @Zye_Clips 13 днів тому +4

      @@Sown. Not for everyone I'll say if you have about a year of programming experience in luau and know how Roblox studios works you could catch on to a fair amount of the suspicious looking code, but for new programmers who just look at things on the surface and don't understand API or anything like that they would have trouble figuring some of this stuff out.

    • @7GrandDadVape
      @7GrandDadVape 11 днів тому +3

      @@Sown. surprised it wasn't even obfuscated, this is legit just poor segmentation for a ss executor, but who even does that nowadays anyway

  • @DavidiSimon
    @DavidiSimon 15 днів тому +45

    My friend once grabbed a tree out of the toolbox called like Дрвад or something like that, I looked in the output and roblox has detected that its malware so I go to check the script but I saw the tree model had some values or something named weirdly like |||:/"||| and stuff so I go into the scripts code and all its doing is cloning itself and parenting itself to like the workspace in a while true loop
    and the best part: the script was called "Marlware"

  • @hunterchartrand6646
    @hunterchartrand6646 15 днів тому +60

    crazy how intricate and well hidden these viruses have gotten. I remember back in the days when all you had to worry about was the "fire spread" virus, that one is a classic.

    • @zenniththefolf4888
      @zenniththefolf4888 9 днів тому +4

      that one actually sounds funny lol
      imagine making a game in Roblox when something just randomly starts on fire and spreads to the rest of the level

    • @ftgodlygoose4718
      @ftgodlygoose4718 3 дні тому

      @@zenniththefolf4888it sounds funny but that’s not what it did unfortunately it was much more malicious. The script was usually named “Spread” or “Firespread” but its function was usually to completely lag out games, create back doors, or kick players using certain gear items

  • @popbottoms
    @popbottoms 16 днів тому +49

    A good way to just instantly get all of the IDs is by putting this at the top of the src
    local _require = require
    local function require(...)
    print(...)
    return _require(...)
    end

    • @AQHgSo07jB8OQhALxnSEoqMT3YHHP
      @AQHgSo07jB8OQhALxnSEoqMT3YHHP 12 днів тому

      require=nil
      require(id)
      u can bypass that tamper function easily

    • @popbottoms
      @popbottoms 12 днів тому

      @@AQHgSo07jB8OQhALxnSEoqMT3YHHP u cant call nil, lol.

    • @popbottoms
      @popbottoms 11 днів тому +2

      @@AQHgSo07jB8OQhALxnSEoqMT3YHHP Idk if my comment disappeared or not, but I can't see it. That would just set the var to nil, and then the function would be deleted, so ur code just doesn't work at all

    • @AQHgSo07jB8OQhALxnSEoqMT3YHHP
      @AQHgSo07jB8OQhALxnSEoqMT3YHHP 11 днів тому

      ​@ sorry i writed it very quickly, heres a working one:
      getfenv()["require"] = nil
      getfenv()["require"](ID)
      add ur tamper script above this code and try it. it will work! tell me when u tried it and i will tell u the explanation

    • @knnk4000
      @knnk4000 6 днів тому

      @@AQHgSo07jB8OQhALxnSEoqMT3YHHP retard

  • @Czarlo
    @Czarlo 16 днів тому +80

    dude idk why but it's so funny how you're calling zephal a "serious project" while just effortlessly bypassing their systems by just entering a different URL 😭 it's genuinely insane the lengths people will go to ruin that one game that added their backdoor by accident, amazing video

    • @cosmic7140
      @cosmic7140 15 днів тому +3

      this is why i am making my own roblox anti virus that reads the source code of these viruses

    • @sdfsdfsdf-wl1nz
      @sdfsdfsdf-wl1nz 15 днів тому

      @@cosmic7140Through plugin? A measly normal script won’t do anything unless you intend to create a plugin

    • @baconheadhair6938
      @baconheadhair6938 14 днів тому +1

      @@cosmic7140 thanks

    • @astraoutlight
      @astraoutlight 14 днів тому +1

      @@cosmic7140when will you release it ?

    • @cosmic7140
      @cosmic7140 14 днів тому +5

      @@astraoutlight i am working on the logs/settings ui's. But it's being annoying, but the actual anti-virus works. So idk

  • @Food4Cats
    @Food4Cats 15 днів тому +19

    At 9:47 I was really surprised how much work this man put in just to hide a reference of http service, in a sense it's pretty smart that he hid the string of "HttpService" as a property lol

  • @Saint-Alx
    @Saint-Alx 16 днів тому +19

    i imagine they would log their chats because they have pretty strict rules about talking about the exploit

  • @GTSFT
    @GTSFT 14 днів тому +9

    I don’t use Roblox Studio often but I’ve always wanted to see one of these types of vids that go in depth about back door scripts.
    You have earned a sub.
    If you wanna continue a series related to “Roblox Malware.” You can probably go beyond just Roblox Studio. You could get into third party extensions if you understand how malicious JS works.

  • @oppalus
    @oppalus 15 днів тому +18

    ain’t no way they used GPT coding to make their trash ahh SS💀

  • @PinkMouse7
    @PinkMouse7 15 днів тому +30

    i always laugh at these type of people that put malware into scripts, they think theyll get someone with a good game but no good dev uses tool box item

    • @EE-qw5dt
      @EE-qw5dt 15 днів тому +6

      i mean there were times where they backdoored popular games like meepcity , frappe v5 , prison life , club iris , even dahood and alot of the time its not even a toolbox model but just a roblox function with a vulnerability

    • @dallyp6143
      @dallyp6143 13 днів тому +1

      I’ve seen some that manually apply for dev on a game and infect their game. Serversides got boring after a while so I moved to exploiting roblox revivals. There’s this one that I exploited called Hexagon that used a late 2014 roblox client and I was spamming coolkidd decals and crucifying people. People were freaking out over everyone in the server being crucified and the like.

  • @MrHydro7official
    @MrHydro7official 15 днів тому +4

    Great video! Malware is certainly interesting and it's ways are intriguing, but I think making a video on ransomware, viruses and even dangerous plugins would truly shine light towards the Roblox studio underworld!

  • @gokuchavoso7312
    @gokuchavoso7312 15 днів тому +5

    i once was on a server of a friend that owned some of these malwares, the structure is quite impressing. in summary, he had a discord server that had a chat which tells which games got infected by these malwares with the link, and once you join these while being friends or being on some specific roblox groups, youd have access to the executors.

  • @vice-grip
    @vice-grip 17 днів тому +7

    Really nice and interesting, first time delving into content like this. You've earned a subscriber.

  • @nicholast013
    @nicholast013 15 днів тому +11

    Unique way of how backdoor script works! The basic way of backdoor that i know was requiring the asset id that was turned to hex and hid them inside script or at the very down end of script but i didnt know this was possible. Amazing

  • @davidkra230
    @davidkra230 14 днів тому +8

    17:14 actually, they'd do this to be able to know when someone is spreading the word about the SS (so yeah, spying)
    they fear the game's developer would notice that there is a ss in their game, and remove it
    just looking at the video, you know that they were in their rookie hour during the design of the fundamental methodology
    and, as someone who dabbles a bit in ss creation, I could see the strengths and weaknesses in their own implementation, but theirs can't be fixed as well as my own, and as far as I know, mine isn't detected by any "malware scanner" plugins, but that's not really the point.
    the point is to improve security, and if they could, they would make some forced fenv polyfills, and maybe even stuff that would require a huge shift in the paradigm they're all using, I'm not really going to name any, as that would hint at exactly what it all is about, and I don't want to take away from the effectiveness of taking down these dynamically dependent executors at this point in time.

  • @Aevony
    @Aevony 5 днів тому

    That's amazing! I've used to find malicious scripts a lot and all I did was look through it, but you went on another level with getting the modulescript and looking through it too, great job there.

  • @deqnpetrovvlogs6881
    @deqnpetrovvlogs6881 15 днів тому +1

    Crazy stuff seeing this as a dev. Made me make sure to double check all of the module scripts im using from other people

  • @axsz-lol
    @axsz-lol 16 днів тому +14

    the publisher can get banned if we all report it, roblox said no obfuscating script before make it public on the creator dashboard

    • @4zaa4
      @4zaa4 16 днів тому

      it cant get banned if its external - no ui

    • @brnwbrwunrwu
      @brnwbrwunrwu 16 днів тому

      there's a way to make it obfuscated so it will never detect

    • @axsz-lol
      @axsz-lol 16 днів тому +2

      @@4zaa4 "To maintain community safety, Roblox may terminate accounts that publish spam or assets with malicious or obfuscated code." - roblox msg when u r about to distribute a model

    • @AlwaysMars-u6p
      @AlwaysMars-u6p 15 днів тому

      ​@@axsz-lollmao this almost never happens if ur smart enough

    • @laihela
      @laihela 5 днів тому

      The models are uploaded on burner accounts, there's no way they are stupid enough to post this stuff on their mains.

  • @unrooot
    @unrooot 16 днів тому +13

    insane - thanks for covering this! it's wild to see how much effort they go through to try to obfuscate it ... also, why sign your backdoor with your name??? 💀💀💀 would love to see a part 2!

    • @fdfdffdfddfsd
      @fdfdffdfddfsd 6 днів тому

      probably sign it with their names to prevent other hackers from stealing it or its just ego

    • @laihela
      @laihela 5 днів тому

      If they are smart it's either a red herring or the name of some guy they don't like.

  • @Steve_Bloks
    @Steve_Bloks 16 днів тому +17

    OOOOOOOOH I KNOW WHAT THIS WAS!
    Some roblox exploiting softwares aka executors also allow server side execution, they do this by backdooring games like this and then if a cheater with the executor joins it would have code to check if server side is available and if yes it would open it and allow the cheater to run code on the server, these were really popular tho they've been dying out recently.

    • @nuclearpoint
      @nuclearpoint 16 днів тому +3

      that's why i don't use toolbox or when i do, i tend to scan through the code alot to make sure nobody's trying to saveinstance my place and send it over to a group of randos (Probs not possible)

    • @HL2Modder2001
      @HL2Modder2001 16 днів тому +1

      Also i think they use their own Loadstring module now, tho if you have loadstring enabled (i.e maybe to allow users to run custom code if you make a singleplayer game or something, can't think of any other use-case tbh) then if you don't properly secure how you run that custom code, exploiters may also exploit that vulnerbility
      so yeah, if you intend on letting users run custom code, make sure to properly secure it first and know what you're doing

  • @Carlos-jw2xd
    @Carlos-jw2xd 16 днів тому +22

    The amount of layers of red herrings, requiring other modules, obfuscation, and trying to remain hidden are actually insane
    For me, just seeing the weird string manipulation and seemingly useless function in the first one would be enough of a reason to delete it, let alone the many more layers you uncovered

  • @SharkishaCostco
    @SharkishaCostco 7 днів тому

    Wow, I had no idea Roblox had malware developers with this level of complexity! Excellent work with your analysis, this was a ton of fun to follow!

  • @P0l15h-C0w
    @P0l15h-C0w 15 днів тому +9

    i got so much unmotivated by these scripts, im just scared to even open the studio lmao, the req thingie was from a plugin, i just kinda quit studio for now.

    • @Hoofer
      @Hoofer  15 днів тому +2

      I recommend uninstalling the plugins you have, and starting fresh. it's pretty easy to stay vigilant of these sorts of things once you know how they work!

    • @fireremix8
      @fireremix8 15 днів тому +1

      ​@@HooferIs there a way to know if the plugins you use are malware as well?

    • @Hoofer
      @Hoofer  15 днів тому +4

      @@fireremix8 There is by checking the source code of the plugin, but it's quite hard. I recommend only using plugins by verified creators, it's a better way to ensure it's safe.

    • @fireremix8
      @fireremix8 15 днів тому +2

      ​@@HooferYeah I suppose so, the most useful and popular plugins are made by verified devs. Thank you.

  • @Kremowicz
    @Kremowicz 12 днів тому +1

    new sub, always wondered how this stuff worked and i like how you have basically zero editing in your videos and just explain stuff without having any ADHD editing, thanks :)

  • @autopiIo7
    @autopiIo7 8 днів тому

    as someone thats been learning lua and scripting for much less time than you (believe me i can tell how long youve been doing it just by how fast you type) im absolutely fascinated by the methods people will use just to do backdoors like this, its absolutely insane and also very interesting to learn and debunk, thank you for making this video!! :)

  • @tupisupi
    @tupisupi 17 днів тому +2

    This is really fascinating, I love virus investigation type videos.

  • @RohitGupta-f9s
    @RohitGupta-f9s 16 днів тому +6

    that print Player:Move Called blah blah blah is a error the studio prints when you try to move the character and it cant find the character humanoid. dont know when this error exactly occurs but yea its a error they printing to make the script look like some player script.

  • @verifedmatt
    @verifedmatt 13 днів тому +2

    pretty decent analysis video, their website got me cracking up😭

  • @ExpirisYT
    @ExpirisYT 15 днів тому +12

    I made one, the thing was a gui (that only was visible to me via my specific userid) and was hidden as a child of like 50 parents, and it let me shut down servers (as in kicking all), it showed me when a game was infected with a discord webhook, and i could run any code i really wanted on servers. i got it on 2 game that averaged 500 people, i will not name them, one of the games removed it but one still has it active and i like messing with them.

    • @amogus_sus_YT
      @amogus_sus_YT 15 днів тому +8

      thats evil

    • @volkingdeath5312
      @volkingdeath5312 13 днів тому +1

      Dude i did something similar back in the day, but it was by joining them small groups from grp as a developer (with no developer skills at all) and then backdooring their game in the hopes it would get bigger in the future. However after a while I just started figuring out how scripting works and just started developing instead, then fuck around with the devconsole 💀

    • @fdfdffdfddfsd
      @fdfdffdfddfsd 6 днів тому

      hell yeah i bet that was fun as fuck

  • @mrtomato_oficial
    @mrtomato_oficial 16 днів тому +4

    I had a malware in a unpublished game, and...i created the scripts😭

  • @mochawasnt
    @mochawasnt 14 днів тому +1

    honestly this is just impressive the way they managed to create such well-hidden and obfuscated malware
    atp id just let them have the game 😭

  • @GSFigure
    @GSFigure 15 днів тому +9

    For some reason, a backdoor require() keeps appearing in one of my games. The only thing is that the required asset is content deleted, so all it really does is be really annoying in the output and keep reappearing at the end of every server script.
    Thank god the asset was deleted, because for some reason, despite me checking my own plugins and the editors' plugins, it always appears at some point after removing.

    • @Aadiyan1
      @Aadiyan1 15 днів тому +4

      delete some plugins and keep the ones that you think are safe

    • @berendberend702
      @berendberend702 13 днів тому

      There might be a script inside a service that's not shown in the explorer, you can do a for loop and put all ModuleScripts in the game in a table to check them

    • @yarik_superpro
      @yarik_superpro 8 днів тому

      @berendberend702 some of scripts can be paranted to unreachable containers like nil

  • @VoidDevel0per
    @VoidDevel0per 6 днів тому

    Very interesting to see how malicious actors, especially on Roblox try to create a backdoor through Roblox studio and sell access to it for a subscription. Good research on this :)

  • @carlthesillyroblox
    @carlthesillyroblox 15 днів тому +1

    my guy just casually destroyed a entire hidden malware hideout
    also love your video

  • @TheRogue_Fox
    @TheRogue_Fox 12 днів тому

    I love how he actually explains what each line does or could possibly and why you shouldn't touch random code lol.

  • @Pepo..
    @Pepo.. 16 днів тому +2

    so interesting, the way they obfuscate it to get around roblox, wow, that's why it's a profitable business

  • @Clappybara.
    @Clappybara. 16 днів тому

    Wow, this video was very VERY interesting. I got malware on my game because someone from teamcreate put in a wrong model. I tried to reverse-engineer it but stopped at joint service. Props to you! You got another subscriber ♥️

  • @J_StudiosAtWorks
    @J_StudiosAtWorks 16 днів тому +3

    The obfuscation and hiding of module scripts are awesome to see but the purpose isnt. All the trouble they went through just for that LOL.

  • @theultimatetrashman887
    @theultimatetrashman887 9 днів тому

    Normally i'd think this was just the average backdoor that gives owner-admin to someone on some admin panel, but its so much more that it got so complex i got lost at the part where it used the description of a content-deleted game to use the words as numbers for a ID of a payload, crazy stuff.

  • @Bad_Studios101
    @Bad_Studios101 16 днів тому +2

    this video was so interesting i did not even notice 20 min passed

  • @voxeledphoton
    @voxeledphoton 13 днів тому

    yea I've found one that also pings a discord server when a game's been infected with it so they know they can go in and grab all the server scripts from it. Nice job going through it ;D

  • @saturnqx
    @saturnqx 15 днів тому

    as a scripter myself, i didn't know you could do half of this
    actually insane the lengths people will go just to hack a game

  • @Billy-gm4wl
    @Billy-gm4wl 16 днів тому

    Love to see it bro, your content is actually really enjoyable.

  • @TheGreenMonkey-ly9oy
    @TheGreenMonkey-ly9oy 9 днів тому +1

    so those https are probably running on node.js javascript backend type script that would run on servers, but the websites yes they use it but its probably just to log stuff I don’t know because i'm not the developer. Anyway the website developing in style is really cool but its use is evil. I love making websites and stuff so far I just started learning the backend scripting so I can run it on a server and make it somewhat accessible.

  • @rodricbr
    @rodricbr 13 днів тому +1

    19:48
    that's a BFLA vulnerability. it happens more often than you might think but they're pretty dumb to let that slide.
    classical lammer made website

  • @Falcarious
    @Falcarious 3 дні тому

    back in my day, free model payloads would just lag the game to high hell and fill the screen with "YOU GOT PWNED" messages

  • @blakcgengar
    @blakcgengar 14 днів тому

    I don't really know what any of this means , but listening to this nerdy stuff made me do my math homework. Thanks man

  • @JulienRodot
    @JulienRodot 16 днів тому +13

    The Roblox version of Eric Parker. Love it.

    • @discussions.
      @discussions. 15 днів тому +1

      Instantly who I thought of.

  • @bluz0r69
    @bluz0r69 14 днів тому

    i remember older roblox malware had a script called "Hello, I am your new lord lolz" - that used to spam into every existing part or function, usually messing with physics or weapons lol

  • @ishootcops-f2j
    @ishootcops-f2j 10 днів тому

    The chat log thing is probably to make sure no one is telling what they are using ingame.

  • @realbxnnie
    @realbxnnie 15 днів тому +2

    i also saw fake “qWeld” scripts that requires a malicious script into the game.

    • @Jukecallaaa
      @Jukecallaaa 13 днів тому

      A lot of malicious plugins disguise their dropped scripts as welders. Roblox Studio Welder, qWeld, qPerfectionWeld etc.

  • @burriter
    @burriter 14 днів тому

    remember one of these, someone added a sofa that had a "Weld" script and then it started popping up gamepasses (i turned 3rd party sales on)

  • @user-yv3jy3eo7x
    @user-yv3jy3eo7x 15 днів тому

    Just earned a like and a subscriber love ur videos man first one and popped up on my youtube for you page I hope you become big one day lol

  • @63306
    @63306 3 дні тому

    Logging the chats of whitelisted users is actually common practice for this type of thing.
    Usually, you need to pay for a whitelist to these types of things, and whitelisted users (obviously) know of the backdoor in the game. In the rare case the developer of the backdoored game is in-game as a whitelisted user joins, the developers of the backdoor don't want the whitelisted user to alert the game developer of the presence of a backdoor, so they log chats and likely automatically detect when a whitelisted user says something related to the backdoor and revoke their whitelist to prevent any loss of backdoored games, since serverside developers usually use the amount of backdoored games they have as a reason to purchase their product over others of similar nature.
    I know this because I previously had been given a leak of the rules for an extremely popular serverside in around 2022 which went for around $6. The rules had a section stating that "you shouldn't talk about the existence of the backdoor in-game". It has been years since I was given this leak and I no longer have it so I don't have the direct rule, but it was something along those lines.
    Just thought it was a kind of funny concept, Roblox censorship

  • @pold111
    @pold111 4 дні тому

    really interesting but jesus, whoever made it really didn't think twice to put their userid in the script, just don't grab anything from the toolbox and you're safe from stuff like this

  • @ipigtaiwan
    @ipigtaiwan 14 днів тому +1

    there's something called luamin to beautify the code automatically btw

  • @ТІР
    @ТІР 16 днів тому +1

    okay, so roblox can delete this decently covered "malware" but can't do anything else right?

  • @byStunt7
    @byStunt7 7 днів тому

    19:50 "You can sign in or you can just bypass it and get to the dashboard directly" All this after this insanely complex code lmao

  • @UltraSolution
    @UltraSolution 14 днів тому +1

    And all this from just one weld script!
    (Also, if you want to separate a script, you can copy it all and re-paste it, it should format itself)

  • @thatsjames_
    @thatsjames_ 17 днів тому

    i found a script similar to this but isn't actually a weld, thanks for telling me otherwise i wouldn't have known my game had a virus!

  • @Radiance_alpha
    @Radiance_alpha 16 днів тому

    this is super interesting, wow. awesome video!

  • @DanyyyyyJPF
    @DanyyyyyJPF 15 днів тому

    i used to be a roblox skid and i made a script that was one line of code, it would just execute a script that would insert a script into the game, that was basically:
    if "player" says "this" give them "exploiting gui that i made"
    didn't do much with it obviously just did it to some of my friends games and a testing game of a game studio :) was fun

  • @koainanis5840
    @koainanis5840 16 днів тому

    pretty nice vid bro
    thanks for all the infos
    next vid pls some more deeper details on how to decode the scripts etc

  • @drax6108
    @drax6108 15 днів тому +1

    7:40
    this is something i can shed some light on. i see people here saying omg i saw this print output in so many games‘ console, omg omg they were hacked!!11!
    well, exactly not. this output aka. warning is very common in roblox framework and you see it in a lot of games. it happens mostly when someone dies and scripts try to move the humanoidrootpart. especially npcs call this as there are just different scripts conflicting with their code. the output is so much overlooked because it doesnt really matter as in most cases after death the npc or player just respawns and everything returns to normal and starts working again. and as you already said, since an update some years ago, roblox outputs when the require() function is called and this seems to create a little loop to spam this output and to distract and effectively have that require output disappearing…

  • @johnmarston2474
    @johnmarston2474 14 днів тому

    Back in the day, before all the FE garbage, there were often numerous RCE (remote code execution) exploits that would allow you to get ACTUAL malware from someone in your game. There were also ones that forced you to teleport and all kinds of interesting things. Sadly those days are over!
    I was playing back when you could use CE to make a sword load a script. Probably ~2009.

    • @dallyp6143
      @dallyp6143 13 днів тому

      Loadstring bytecode moment

  • @firesaccount
    @firesaccount 3 дні тому

    19:47 I did not expect "So you can make like a sign in, or you can just bypass it"

  • @duskdancer7577
    @duskdancer7577 13 днів тому

    maybe i'm being naive, but from what i can understand Zephal LLC's web based user moderation system can be a legitimate tool for developers to integrate serverside execution for things like moderation and the like, it's just that whoever developed these backdoor scripts is appropriating it to get execution on random games.
    also it doesn't say you can't dissect the code it says you can't *disseminate* it which makes sense because its paid software and sharing the code would be like piracy
    either way zephal sort of looks like overpriced shady crap anyway

    • @Hoofer
      @Hoofer  8 днів тому

      The tool is entirely illegitimate. They only use it for backdoors, they are lying. It was specifically made for that and that only.

  • @fireremix8
    @fireremix8 16 днів тому +5

    How does he just "grab" the deleted modulescripts or assets in general?
    Btw very informative video, helps me with understanding malware scripts, it's like deciphering lol

    • @Hoofer
      @Hoofer  15 днів тому +4

      I saved them before they got deleted.

    • @fireremix8
      @fireremix8 15 днів тому +1

      ​@@HooferOkok thank you, I got a bit confused. Thx for the insight

  • @CoolBoy76628
    @CoolBoy76628 15 днів тому

    me: oh nah roblox why would there be malware in roblox?
    hoofer: You sure?

  • @icecream5793
    @icecream5793 10 днів тому

    Damn, I have never seen something like this.. using the properties tab to obfuscate code is crazy work.

  • @Exrl_
    @Exrl_ 13 днів тому

    only ogs remember the fire spreader or the unanchor everything in workspace viruses

  • @ьффь
    @ьффь 5 днів тому

    you actually cant be banned for using serversides (unless a roblox mod personally bans you) although you CAN be banned for making serversides

  • @only-deer
    @only-deer 15 днів тому

    Very informative. This helped me alot. Thank you!

  • @actual.energy
    @actual.energy 15 днів тому

    This is very entertaining Icl I'm subbing (no glaze)

  • @byStunt7
    @byStunt7 7 днів тому

    Wow, that's so interesting. To see how much effort those people make to get a backdoor to a roblox game... Crazy. With all the different moduley that are required etc. And then to see that their website is completely broken since you can just type in another url to bypass login etc. lol

  • @ThePhanteq
    @ThePhanteq 5 днів тому

    funny how i am watching this while knowing nothing about scripting

  • @JEFPY_
    @JEFPY_ 15 днів тому

    the devs are glazing so hard but yet its just a convoluted backdoor script lol

  • @NatlixNPX
    @NatlixNPX 13 днів тому

    if you wanted to quickly get the ID, you could just replace "require" with "print" without having to do any of the previous work

    • @Hoofer
      @Hoofer  12 днів тому

      Sometimes this won't work because they will check if you're in studio or if your job I'd is ""

  • @xayanide
    @xayanide 11 днів тому

    Great analysis video!

  • @duckymomo360
    @duckymomo360 17 днів тому

    i cant believe roblox actually deleted it. wonder if their weird anti-malicious-script ai caught it

  • @bound4skew
    @bound4skew 16 днів тому +1

    18:00 thats crazy to be honest. fake error message??

  • @TegridyMadeGames
    @TegridyMadeGames 6 днів тому

    "its well hidden"...
    *entire game is malware*

  • @jadedxQnabos
    @jadedxQnabos 16 днів тому

    i found malware in an old game i had, it was poorly hidden and sadly by the time i found it, it had already been deleted so i couldn't examine it

  • @YxngReckless
    @YxngReckless 16 днів тому +1

    If these malicious people put their mind to something productive the world could be a crazy place.. 😂

  • @Chill_yz
    @Chill_yz 15 днів тому

    this shits awesome love how u dissect shit and reverse engineer this, subbed:3

  • @freevipservers
    @freevipservers 13 днів тому

    Ngl back in 2021 and 2021 I loved to use SS executors. Giving myself owner or higher HD admin, kohls, messing with the bots playing these free model ridden games was so fun.

  • @Boiner
    @Boiner 15 днів тому

    If you guys didn’t know they can copy all the scripts from your game too

  • @Bupu
    @Bupu 16 днів тому

    This was really interesting. Thank you!

  • @cheetahrbx4575
    @cheetahrbx4575 15 днів тому

    Wow, what an intricate and complex piece of work. I don’t get why people put so much effort just to get banned 😂

    • @exploitenthusiast
      @exploitenthusiast 15 днів тому

      they dont, you cant get banned with serversides restard.

  • @emad-t7u
    @emad-t7u 16 днів тому

    could you make a video to show how to get your mouse cursor please? it looks really cool :) and also perhaps your roblox studio customization n other cool looking designs

  • @artbm172
    @artbm172 12 днів тому

    the fact that this comes from a weld script

  • @HL2Modder2001
    @HL2Modder2001 16 днів тому +2

    the sun is leaking

  • @ElmoPlayss
    @ElmoPlayss 15 днів тому

    There is no such thing as malware inside Roblox.. You can't do any actual harm to a game since it only happens when the game is ran.. The game itself would never be harmed, only the servers which again can simply be shutdown after this "malware" is deleted

    • @Hoofer
      @Hoofer  15 днів тому

      That's why I wrapped it in quotes, it's VERY similar to malware, but not *exactly*. I disagree that this couldn't cause any harm, you could wipe player data, ban players, etc. You could also forcefully parent all server ModuleScripts into a client accessible directory, allowing them to be decompiled. In a game like mine, this would basically allow for full server decompilation as there is only a very few server scripts.

  • @reedve
    @reedve 15 днів тому

    This is an awesome and very informative video dud