๐ฏ What Happened?
Gamers playing the PC version of Call of Duty: WWII found themselves exposed to a serious vulnerability. According to Malwarebytes, malicious hackers exploited the game’s online matchmaking system to execute arbitrary code on other players’ machines during active gameplay.
As a precaution, the developers temporarily took the PC servers offline to investigate and mitigate the exploit.
๐ง How the Exploit Works
- The attacker joins a public multiplayer lobby in Call of Duty: WWII.
- They exploit a flaw in the lobby system to remotely inject code into connected players’ PCs.
- This leads to remote code execution (RCE), giving the hacker potential access to the victimโs system.
While console versions remain unaffected, the PC platform (especially via Steam) is currently being monitored for further risk.
๐ซ Temporary Shutdown
The PC version has been disabled while the developers assess and patch the vulnerability. This proactive move aims to stop further exploitation and protect users’ machines.
๐ก๏ธ What Should Players Do?
- Avoid launching Call of Duty: WWII on PC until an official patch is released.
- Make sure antivirus software (like Malwarebytes) is active and up to date.
- Refrain from joining unknown or suspicious lobbies when the game goes live again.
- Update your Steam client and verify game file integrity regularly.
- Watch for system abnormalities or slowdowns that might indicate backdoor activity.
๐ SEO Recap
- Event: Active exploitation of Call of Duty: WWII PC via online lobbies.
- Impact: Remote code execution vulnerability affecting players’ devices.
- Response: PC servers temporarily taken offline for investigation.
- Action: Avoid game usage, ensure system protection, wait for developer patch.
๐ Read the Full Analysis
For in-depth technical information and the evolving status of the issue, read the original Malwarebytes post:
๐ Full Article: Gamers Hacked Playing Call of Duty WWII
Game safe. Stay updated. Patch fast.