Malware in Github stole data from Minecraft players

The accounts involved have already been suspended. The malicious code was presented as one more mode among the many that allow the game to be modified.
The computer security firm, Check Point, has discovered the origin of two Malwares that affected Minecraft players. The malicious code was tracked to the Github repository. Github is a legitimate place that houses many projects of great value. But it is not invulnerable to misuse.
The origin of the malware detected is well known. In the code several fragments were found in Russian, which has led to conclude that it was produced by a group that speaks that language. Thousands of players have been affected by malware. The consequences of it can be very serious, since its objective is to steal bank accounts, cryptocurrency wallets and take advantage of access to browsers and applications of infected computers.
Operation
The deception is based on the fact that Minecraft allows users to play with modified versions of the game. These are the mods that alter mechanics in various ways. Malware is uploaded to the repository and presented as one more mod. Promises players advantages or some option that is not present in the classic version of the game.
Once the code is installed, when the game is executed, data theft begins. The information of the browsers is vulnerable. Names, emails, addresses, bank details are captured.
Due to the actions of this malware, the group that is in greater danger is that of young adults. People with income, with still a good amount of time to play video games often more prone to acquire cryptocurrencies. They are also the people with some more knowledge to make modifications to a game.