Kernel-level anti-cheats are the next tech disaster waiting to happen (2024)

Key Takeaways

  • Kernel-level anti-cheat gives deep access to monitor and control how software interacts with hardware, offering strong protection against cheats.
  • ESEA and Vanguard are notable examples of kernel-level anti-cheat systems that have faced issues like a bitcoin miner and blue screen errors.
  • Using kernel-level anti-cheat poses risks like system instability and conflicts with other software, with potential for catastrophic failures if updates go wrong.

If you're engaged in any of the competitive gaming landscape, then you've probably heard of kernel-level anti-cheat. It's an exceedingly controversial mechanism used to curb cheating In online games, but the trade-offs required for it aren't necessarily worth it. Not only are you giving an incredible amount of access to your computer to a games company, but the level of privilege that it runs at means that any bug or other problem introduced can cause your computer to blue screen or even fail to boot.

Related

DMA and AI are the next frontier of online cheating, but Riot has a plan

We spoke to Nick Peterson, Principal Software Engineer of Anti-Cheat, and Phillip Koskinas, Director and Head of Anti-Cheat of Riot.

What is kernel-level anti-cheat?

It runs at a privileged level

Kernel-level anti-cheats are the next tech disaster waiting to happen (2)

Kernel-level anti-cheat systems work directly at the core of a computer’s operating system, giving them deep access to monitor and control how software interacts with the hardware. This allows them to effectively detect and block cheats that attempt to manipulate game code or memory, offering stronger protection than traditional anti-cheat methods. This gives it the ability to spot cheats that utilize Direct Memory Access and other unique methods.

However, because these systems operate with such high-level access, they also pose significant risks. If there’s a flaw in the anti-cheat software, it could potentially compromise the entire computer, raising concerns about security and privacy. Additionally, this deep integration can sometimes cause conflicts with other software, leading to system instability.

These anti-cheats tend to be loaded as a driver, meaning that they operate with an incredible level of privilege on your computer. When a kernel-level anti-cheat driver is loaded, it runs with the same high-level permissions as the operating system itself, allowing it to oversee all other drivers, processes, and memory allocations on the system. This means it can detect unauthorized modifications or injections into a process' memory, except by running at such a privileged level, the anti-cheat driver can intervene before any cheat software can take effect, effectively blocking or reporting suspicious activities in real time.

Related

Best gaming laptops in 2024

Take your gaming on the go with one of these great laptops

Kernel-level anti-cheat has a pretty rough history

ESEA and Vanguard are two you may have heard of

Kernel-level anti-cheats are the next tech disaster waiting to happen (4)

There are plenty of games out there that use kernel-level anti-cheat nowadays, and some of the biggest are Counter-Strike 2 (through third-party services), League of Legends, and Valorant. Years and years ago, the third-party matchmaking service ESEA in Counter-Strike used a kernel-level anti-cheat to protect its games from cheaters. To the company's credit, ESEA was the go-to anti-cheat for years that uncovered a major cheating scandal across a small number of professional players.

However, it hasn't been all good with ESEA. On April 13th in 2013, a bitcoin miner was added to the ESEA client, which was discovered on May 1st. ESEA agreed to a $1 million settlement a year later, and the company blamed a rogue employee for the distribution of the miner. While a bitcoin miner can run without kernel-level access on a Windows machine, hiding it inside of an anti-cheat makes it harder to detect and protects it from being analyzed.

On top of that, a significantly more recent example came with the launch of the Vanguard anti-cheat in League of Legends. Vanguard has been used for a couple of years now in Valorant, and when it was eventually rolled out in League of Legends, a ton of users reported that their computers had started to face consistent blue screen of death errors. While Riot stated that a very small percentage of users had problems caused by Vanguard, users insisted that the problems only began after installing the anti-cheat, and some reported that the problems went away after removing it.

Related

How to move Valorant to an SSD

Improve your performance and get faster load times when you transfer Valorant to an SSD.

Is kernel-level anti-cheat needed?

it's a bit of a murky topic

Kernel-level anti-cheats are the next tech disaster waiting to happen (6)

Source: Battlestate Games

Looking back over the years, anti-cheat software versus cheat providers has been an incredibly long and drawn-out cat-and-mouse game. To be clear, any software on a Windows computer can be used to siphon information away and try to take control of your computer, and whether or not it runs at kernel level doesn't change that. For example, a kernel-level anti-cheat can access your webcam and see your screen, but so can any software that runs on your computer, too.

To illustrate the point, there is anti-cheat software still in use that hooks into your game (not at the kernel level) and takes screenshots every second for analysis. One popular free anti-cheat used for tournaments is called MOSS, and it will give you a ZIP file when you close your game that you can then hand over to the tournament operator. It's still somewhat invasive, but significantly less so than an anti-cheat that runs as a driver when you start your computer.

However, there's an argument to be made that the ever-growing arms race between cheat developers and anti-cheat developers is simply going to continue escalating. Nowadays, sophisticated cheats are also built as drivers for Windows, and they've been known in the past to use spoofed driver signatures so that they can pass driver signature verification. These kinds of tactics make it significantly harder to detect them, and why game developers feel that the natural evolution of anti-cheat software is to use these kernel-level anti-cheats.

One bad update can render millions of computers unusable

See: Crowdstrike

Kernel-level anti-cheats are the next tech disaster waiting to happen (7)

Here's the problem: when you have an anti-cheat running on millions of computers worldwide that runs when the system runs, there's a lot of control being handed over to the computer that makes the anti-cheat. In the case of Vanguard, one bad update would see computers around the world fail to boot. Imagine if an update went out by mistake with an untested change that crashed computers. That's basically what happened with CrowdStrike, a company that makes security solutions for enterprise consumers. Do you really think a gaming company wouldn't be capable of making a similarly colossal mistake?

Make no mistake, millions of people use their computers for gaming across the globe, and any update that would go out that could cause damage would cause damage on a similar scale to what happened with CrowdStrike. The issue is that users who don't know how to fix tech problems like these by themselves won't be able to get any help from the tech support afforded to big companies that were affected.

However, the damage that would be done would make it a true tech disaster that rivals some of the biggest to have ever happened. The difference would be that consumers are affected, not enterprise, but otherwise, the amount of damage done would still be incredible. Not only that, anti-cheat software could be vulnerable to malware, and could be a deeply privileged vector for an attacker to gain access to a machine.

As it stands, these companies test and deploy anti-cheat software on their own machines, which should avoid the vast majority of potential problems, but then again, you would think the same of what happened with CrowdStrike, too. Plus, given that we've already seen what has happened in the past with both ESEA and Vanguard, it's not impossible that other problems can rear their heads on top of that.

Related

Forget CrowdStrike - Here are 5 companies you've never heard of that the world relies on

A lot of computational control is consolidated across very few companies, and here are five you've never heard of.

2

  • Software and Services
  • Windows 11: Everything you need to know
  • Gaming

Your changes have been saved

Email is sent

Email has already been sent

Please verify your email address.

You’ve reached your account maximum for followed topics.

Manage Your List

Follow

Followed

Follow with Notifications

Follow

Unfollow

Readers like you help support XDA. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

Kernel-level anti-cheats are the next tech disaster waiting to happen (2024)

FAQs

Kernel-level anti-cheats are the next tech disaster waiting to happen? ›

ESEA and Vanguard are notable examples of kernel-level anti-cheat

anti-cheat
Anti-cheat software is designed to prevent players of online games from gaining unfair advantage through the use of third-party tools, usually taking the form of software hooks. It is challenged to run securely in an aggressively hostile environment. See Cheating in online games.
https://en.wikipedia.org › wiki › Category:Anti-cheat_software
systems that have faced issues like a bitcoin miner and blue screen errors. Using kernel-level anti-cheat poses risks like system instability and conflicts with other software, with potential for catastrophic failures if updates go wrong.

Why is kernel level anticheat bad? ›

Security Vulnerabilities: The most concerning risk is related to security. When a program operates at the kernel level, ANY vulnerability in that program can potentially open the door to the entire system. If exploited, such vulnerabilities can lead to serious security breaches.

Does easy anti cheat run at kernel level? ›

Do note that EAC also runs at the kernel level. Vanguard has it's kernel-level driver running from startup, whereas EAC only starts the kernel-level driver when booting up the game.

Does Fortnite use a kernel level anticheat? ›

The most popular multiplayer games, with hundreds of millions of players, have adopted kernel-mode anti-cheat for effective protection. Popular games using kernel-mode anti-cheat: Fortnite (1)

Should I be worried about anti-cheat? ›

No kernel level anticheat is ever safe. They are, by design, unsafe backdoors into the operation of your system that allow a third party software to audit what you're doing, and interfere as required to "prevent cheating".

Is BattlEye a kernel level anticheat? ›

You have 275 hours in Arma 3 which uses Battleye, which is a kernel level anti cheat. You're scared of something you've used for over 275 hours, and I bet I could find more games if I kept scrolling that use kernel level anti cheat that you already play.

Does XDefiant use kernel level anticheat? ›

Does XDefiant have Anti-Cheat? Yes. XDefiant uses Ubisoft's BattlEye anti-cheat system which is automatically installed with any Ubisoft game.

Does Elden Ring use kernel level anticheat? ›

Especially since you've been waiting to play it for a while. Better uninstall Hunt: Showdown, CS2, and Elden Ring then, OP. Those games uses kernel-level anticheat too. Oh, you didn't know?

Is Easy Anti-Cheat malware? ›

Our mission is to keep games fun. Easy Anti-Cheat is non-invasive and trusted industry-wide. Experience your favourite games the way they were meant to be experienced by complementing your security efforts with established technology and practices.

Is Vanguard a kernel level anti-cheat? ›

Since Vanguard runs at the kernel level, it is able to detect cheat software that also run at the kernel level as well as any lower level, which are the vast majority.

How intrusive is Vanguard? ›

If you don't let Vanguard start up at the same time as Windows, then it won't trust your PC, and you won't be able to play Valorant, or, now, League of Legends. At launch in particular, Vanguard was seen as too intrusive.

Is Riot Vanguard legal? ›

Riot Vanguard was made with Riot Games' dedication to data privacy specifically in mind, and we worked with our legal and compliance teams to ensure it adheres to regional data privacy laws. Specifics on what data we use and collect are available here.

Why do people hate kernel level anticheat? ›

The issue with kernel-level anti-cheat is that you end up having a lot of them installed on your computer. If only one is compromised with a supply chain attack, the attacker can access all the players computers.

Is vac a kernel level anticheat? ›

Valve. Valve has been using its own Kernel-Level Anti-Cheat System, Valve Anti-Cheat (VAC), on games such as DOTA, Counter Strike and Call of Duty since 2002.

Is apex anti-cheat kernel level? ›

You might not know this but some of the most popular games, such as Fortnite, Fall Guys: Ultimate Knockout, Halo: The Master Chief Collection, Player Unknown's Battlegrounds, Rainbow Six Siege, Apex Legends and VALORANT all use kernel-mode anti-cheat solutions.

What is a possible danger of running code in kernel mode? ›

All code running in kernel mode shares a single virtual address space. As a result, a kernel-mode driver isn't isolated from other drivers or the operating system. If a kernel-mode driver mistakenly writes to the wrong virtual address, it could compromise data belonging to the operating system or another driver.

What is kernel level anti-cheat hacked? ›

Kernel level access means that the anti-cheat software has access on a software and hardware level of your machine. Meaning if a hacker can get access to it, he has access to EVERYTHING on your computer. To everyone making up excuses for the devs.

Does Faceit use kernel level anticheat? ›

Many gamers have instead opted to play the game through the platform FACEIT, which provides kernel-level anti-cheat for those who play on its platform. Kernel-level anti-cheating software is a type of measure that works by operating at the core of an operating system.

References

Top Articles
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6326

Rating: 4.1 / 5 (52 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.