p
At its peak, Unnamed had 5,000 users in two months, and although they wouldn’t give us their exact revenue they were making off the cheat, their weekly access costs $30, which would equate to more than $150,000 a month, normally accepted through cryptocurrency. When asked about where their largest market was, they responded with “Asia”.
Once you go further into the hacking world, cheats become more sophisticated. We spoke with another cheat developer, who chose to remain anonymous, touting the use of AI as the basis for their code. We learned this is in relation to a method for aimbot developers from an open-source code called You Only Look Once (YOLO)--a real-time object detection model– to develop the base of their aimbot. To add even more complexity, developers are even putting in advanced mathematical equations to their code, known as bezier curves, which humanize the aim and add randomization to the algorithm, therefore throwing off anti-cheat that only looks for snapping movements. But to understand how anti-cheats work, we must discuss the basics of how Vanguard works and the main advantage of Riot’s system, and this starts with preventing hackers from loading cheats at the very beginning.
Microsoft describes the kernel as, “a single virtual address space. As a result, a kernel-mode driver isn't isolated from other drivers or the operating system. If a kernel-mode driver mistakenly writes to the wrong virtual (RAM) address, it could compromise data belonging to the operating system or another driver. If a kernel-mode driver crashes, it causes the entire operating system to crash (BSOD)”.
Several system drivers operate at this level, including but not limited to graphics card drivers, antivirus drivers, and audio interface drivers. A kernel level anti-cheat is meant to prevent read/writes of the game’s memory and therefore stop DLL injection.
Vanguard’s initial kernel technology is nothing new as far as anti-cheats are concerned (we’ll get into specific new tech from Vanguard later in this article), as kernel anti-cheats such as Faceit, which is used with the popular game CS2, as well as EasyAnti-Cheat, a software used in Apex Legends, Fortnite and several other titles.
A large reason for the move to kernel level anti-cheat is that the software maintains integrity of system drivers before other programs have a chance to load. Kernel level anti-cheats have diverse tools to stop cheats, and this includes hardware cheats, which are some of the most powerful cheats on the market.
This safely allows the cheater to run the cheating program on one computer, and plug peripherals from the main PC into the Kmbox. The cheat essentially doesn’t touch the primary computer, preventing any flags from the anti-cheat software. This is done by having the hardware mask itself as a keyboard or mouse. This method is deemed as one of the safest (but most expensive due to needing a second PC) methods of cheating. The next method of DMA is by far the most popular.
Popular DMA devices such as an Arduino can be purchased for $20 on ecommerce websites. Similarly a Raspberry Pi Pico WH can be purchased for $7 and converted to a DMA device. These DMA hardware are connected through a COM or USB port, or straight into a PCI slot, and masks itself as a mouse, keyboard or other peripheral. This device then runs the cheat, separate from your computer and directs it back into the computer system. There are several tutorials online that show cheaters how to develop their own aimbot with the Arduino hardware.
We spoke with cheat developers about cheating with DMA, and specifically the Arduino, and many of them confirmed that Riot has been targeting these devices, particularly because they do not involve another PC. Even one Riot insider confirmed with Esports Heaven that Arduinos have been detected since around 2021 or 2022, presumably through detecting the firmware, although there are still ways to circumvent Vanguard detection with these devices.
The fight against DMA devices is analogous to million dollar Russian tanks fighting $300 Ukrainian drones, the price of upkeep for a multi-million dollar anti-cheat like Vanguard against a $7 Raspberry Pi was not lost on us. Despite that, DMA hardware is rare though, even in the cheating world, and most work through scripting and DLL injection.
Like with all anti-cheats, the primary purpose is to prevent the use of manual banning and watching game replays (demo reviewing). For a developer, falsely banning players is something that can quickly lead to distrust from the community, and not having hard data to do bans, such as demo reviewing, does not cut it for evidence. Even recently companies such as Waldo Vision, or Anybrain are claiming to use emerging AI technology to recognize cheaters just from watching demos but many are skeptical of the accuracy of such technology since it does not have direct access to the game’s code. Riot themselves are not impervious to manually banning players, as they currently still have a manual process for more complex cases.
We spoke with one LoL cheat developer for a cheat called Vision–which they also develop a cheat for Valorant as well–that was selling a private cheat for about $550 for a lifetime membership and would only take signups every two months since the news of Vanguard coming to LoL. This is to not draw attention from Riot, in what many in the cheating community describes these cheats as private cheats.
When asked about Vision’s most popular market, they responded with, “Korean and Japanese users far outnumber those on other servers”.
There were several LoL hacking communities Esports Heaven talked to that announced they were going private with the announcement of Vanguard, often pausing memberships until they could provide a bypass for Vanguard to continue their cheat service. Often these communities would make announcements via private discord channels, some of which we were given access to, and were in excess of 500 users.
When asked how strong the current anti-cheat is in LoL, the Vision developer commented, “it’s nowhere near as tough as Vanguard, not even a fifth as strong”.
Additionally, we saw several botting services available for purchase. Botting refers to either software or individuals who level accounts and either reach them to level 30 (which is the level that unlocks most of the features in LoL) or they promise a specific rank, such as the coveted Diamond or Master tier. Often these services use scripting software to cheat and efficiently climb the account to high elo.
The issue with combatting scripting in LoL is that these cheats are used repeatedly, even if they’re detected. Hackers have developed a method called a bypass, which allows the use of the original cheating software, and the bypass script is layered with the cheat to allow it to execute undetected. These bypass scripts often support multiple cheating softwares, and therefore have created a business off of other programs. One bypass Discord community we visited contained over 700 users.
With so many different scripts, bypasses and even services that give software along with DMA hardware and setup instructions, the fight against hackers seems impossible and when we asked the Vison script developer if they had Riot’s current anti-cheat source code Packman, they responded, “no, but we have a method called full game dumping and decrypting all parts, and preparing them for decompilation. It’s not like having the source code of the game, but with tricks and knowledge of assembly language, it’s very easy to understand where the anti-cheat check is, what functions it monitors, and how to bypass it”.
With such skilled hackers operating in a low-level programming language such as assembly–which is often referred to as one of the closest languages to binary–it becomes that much more difficult for Riot to hide how their anti-cheat works. Valorant remained no exception to this disassembly.
According to the article, “this approach allows the game to access the shadow region from a whitelisted thread without any noticeable impact on performance. This is an ingenious solution that demonstrates the level of innovation and dedication that goes into developing an effective anti-cheat system like Vanguard”.
When asked to rank anti-cheats from 1-10, 10 being highest, Xyrem responded:
Vanguard 10
EasyAntiCheat 9 (Fortnite, Rust, Apex Legends, etc)
Unity 7
Battleye 4 (Tarkov, Pub G, Rainbow 6)
Ricochet 1 (CoD Warzone)
Another reverse engineer rated:
EasyAntiCheat 8/9
Battleye 6
We also asked the developer smd of Unnamed Valorant cheat to rank the anti-cheats they’ve encountered from best to worst. They responded with:
1. Mrac (CoD Warface)
2. EAC (Fortnite, Rust, Apex Legends, etc)
3. Faceit (CS2)
4. Vanguard
When we asked why they ranked EasyAntiCheat so high, and Vanguard so low, they responded, “I think EasyAntiCheat has more potential than Vanguard”.
We asked another reverse engineer who chose to remain anonymous about how EasyAntiCheat uses a similar method to Valorant for cloning a page table (virtual RAM addresses) and they said, “EasyAntiCheat was recently inspired by Vanguard. In fact, they do shadow regions better. They have the same end result but they can detect more often when cheaters try to get access to the game via CR3 by effectively locking off the entire game away from the cheater unless they use certain Windows functions. These functions then ultimately allow them to determine that a cheater was trying to access the game which is a big trap”. For a more in-depth and technical explanation, this can be found here by another reverse engineer, and as it turns out, the Riot Vanguard team are well aware of EasyAntiCheat’s progress.
As one can see, Vanguard and EasyAntiCheat are very similar, but for some reason Vanguard gets more publicity, and that may be due to privacy concerns in relation to the parent company of Riot Games, Tencent.
China flag is depicted on a sports cloth fabric with many folds. Sport team waving banner
Other trepidations about Vanguard include how irresponsible Riot will be with such privileged access to player computers, as they suffered a security breach as recent as 2023 on their own servers, along with one of the largest data breaches in gaming history in 2013. This worry is also not alleviated, as another company in the anti-cheat space, ESEA–who are the creators of the popular third-party kernel anti-cheat software for esports tournaments in CS:GO (and now CS2)--were caught hiding a bitcoin miner in their software in 2013. A spokesman from ESEA claimed that it was a rogue employee that injected this bitcoin miner into the main software.
Security expert Saleem Rashid spoke with Ars Technica about Vanguard, saying "whenever you have a driver like that, you're at risk of introducing security and reliability issues to the computer”.
With any driver, there is a risk of hackers using it to gain kernel level access to your computer through an exploit, and this could affect a multitude of computers with Vanguard installed. In discussing this with a reverse engineer they said, “it doesn’t happen often, but it does pose a risk. I covered an exploit a few years back in EasyAntiCheat where I could inject virtually anything into the game and hide it from the system by virtue of the anti-cheat’s protection”.
If Vanguard were compromised, Riot would need to remove Vanguard from user computers through a forced update, although that doesn’t mean this would necessarily undo damage already inflicted on users. When we spoke with an anonymous Riot insider about the fear of potential malware exploits in Vanguard, they responded, “there’s zero room for error but again, the trust really has to be earned and if the players do not trust it, there really isn’t much that can be done”.
A large reason why Riot are pushing for more computer access is to take the fight to the lowest level and prevent cheaters from having access to the game in the future, which is why their anti-cheat implements one of the most innovative pieces of technology, and Vanguard’s secret weapon, the Trusted Platform Module.
Players that cheat receive a 120 day HWID ban according to the Valorant Police Department Discord server, and the account that was caught cheating is permanently banned, so the user will need to create an entirely new account after their 120 days are up to continue playing Valorant.
Several Valorant cheat developers aren’t concerned with their users getting banned even if they get caught. When asked about Vanguard’s hardware bans affecting Unnamed’s user base, smd responded, “we provide a free spoofer with our cheat to all users”.
A spoofer is a program which creates or masks your HWID, therefore avoiding even the most aggressive detection methods and bans. We saw several cheat developers offering this service, completely circumventing Vanguard bans and allowing users to continue cheating. But the one thing that cheaters cannot spoof is the TPM, with even Gamerdoc recently memeing that hackers cannot circumvent this method.
There is no way to duplicate a TPM key other than through a virtual machine, which Riot forces users to disable. This is also why products like GeForce NOW–a popular cloud gaming service–does not work with Valorant, along with the likes of Linux which often uses virtual machines to run a copy of Windows (or Linux Wine which runs in user mode, not kernel, which would defeat the purpose of Vanguard). This would also mean that Riot will effectively get rid of bot farms in LoL, as there is no way to run virtual machines with Vanguard, meaning that multiple instances of the game cannot be recreated.
Cheaters avoid the use of a TPM entirely through staying on Windows 10, but Valorant has already started forcing some Windows 10 players to enable TPM. But for now, hackers can largely stay on Windows 10, although this version of Windows comes with some drawbacks for the average user.
Vanguard still allows users to play on Windows 10, but requires that Virtualization-Based Security is disabled (VBS). Additionally, Valorant requires Windows 10 users to turn off Core Isolation and Memory Integrity, which could create security vulnerabilities for users. Memory integrity “protects and hardens Windows by running kernel mode code integrity within the isolated virtual environment of VBS. Kernel mode code integrity is the Windows process that checks all kernel mode drivers and binaries before they're started, and prevents unsigned or untrusted drivers or system files from being loaded into system memory”.
More cynically, several security experts are referring to TPM modules as a disguised Digital Rights Media (DRM) device.