Editing
Minecraft modding
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Reception === ''[[PC World]]''{{'}}s Nate Ralph calls installing mods for ''Minecraft'' "a somewhat convoluted process", but does admit it could serve the player who desires "a little more out of the experience" of playing the game.<ref name="PCWorldInstalling" /> Max Eddy of ''[[PC Magazine]]'' also raises a point concerning the process of setting up a game augmented with mods, claiming "it seems rather complicated" and that at first he was "too afraid to mod Minecraft at all", but learned to appreciate it when he realized that modding ''Minecraft'' is "pretty forgiving".<ref name="PCMag10best">{{Cite web |last=Eddy |first=Max |date=30 July 2013 |title=The 10 Best Minecraft Mods Anyone Can Use |url=https://www.pcmag.com/article2/0,2817,2422181,00.asp |access-date=27 April 2017 |website=PC Magazine |publisher=Ziff Davis |archive-date=15 May 2017 |archive-url=https://web.archive.org/web/20170515145604/http://www.pcmag.com/article2/0,2817,2422181,00.asp |url-status=live }}</ref> Eddy does nevertheless mention that he feels Mojang's fast development pace regarding the main game has slowed down the progress of the most popular mods.<ref name="PCMag10best" /> Similarly, Benjamin Abbott of ''[[Metro (British newspaper)|Metro]]'' agrees that adding mods to ''Minecraft'' is "a thorough pain in the backside", though he concedes that "the result is usually worth it".<ref name="MetroConsoles" /> Minecraft mod ''Galacticraft'' was mod of the week in ''[[PC Gamer]]'' in July 2013.<ref name="PCGamer">{{Cite web |last=Livingston |first=Christopher |date=21 July 2013 |title=Mod of the Week:Galacticraft, for Minecraft |url=https://www.pcgamer.com/mod-of-the-week-galacticraft-for-minecraft/ |access-date=4 February 2020 |website=PC Gamer |archive-date=5 February 2020 |archive-url=https://web.archive.org/web/20200205001139/https://www.pcgamer.com/mod-of-the-week-galacticraft-for-minecraft/ |url-status=live }}</ref> At ''[[San Jose Mercury News]]'', George Avalos claims that mods are definitely suited for "mainstream enthusiasts", but does warn that precaution must be taken in order to avoid downloading "dangerous and spammy software" when looking for ''Minecraft'' mods. Avalos also remarks that installing mods will probably require adult attention,<ref name="MercuryNews" /> even though ''Minecraft'' typically appeals to children.<ref name="Fox8children" /> ==== Controversies ==== In 2013, the developer of GregTech, a mod aimed at increasing ''Minecraft''{{'}}s difficulty, noticed that some of GregTech's crafting recipes would be overwritten by another mod named "Tinkers' Construct" and deliberately inserted code into GregTech which would crash the game client if it detected any other mods. The authors of both mods later settled their dispute.<ref name="RockPaperShotgun" /><ref name="PcGamesGregTinkers">{{Cite web |last=Benson |first=Julian |date=30 June 2013 |title=Minecraft mod GregTech contains code to crash game |url=http://www.pcgamesn.com/minecraft/minecraft-mod-gregtech-contains-code-crash-game-should-its-changes-be-undone-other-mods |access-date=18 February 2016 |website=PCGamesN |publisher=Network N |archive-date=21 October 2018 |archive-url=https://web.archive.org/web/20181021120005/https://www.pcgamesn.com/minecraft/minecraft-mod-gregtech-contains-code-crash-game-should-its-changes-be-undone-other-mods |url-status=live }}</ref> Another surrounded the mod Bukkit, an API which enabled others to install server-side mods.<ref name="Cadenhead2">Cadenhead 2014, p. 2</ref> In 2014, the leader of the Bukkit team, Warren "EvilSeph" Loo, a former Mojang employee, announced that development would cease, prompting Mojang to take over development.<ref name="AsModTurns">{{Cite web |last=Fudge |first=James |date=5 September 2014 |title=As The Mod Turns: The Latest In The Ongoing Minecraft 'Bukkit' Saga |url=http://gamepolitics.com/2014/09/05/mod-turns-latest-ongoing-minecraft-bukkit-saga/ |url-status=dead |archive-url=https://web.archive.org/web/20141017235432/http://gamepolitics.com/2014/09/05/mod-turns-latest-ongoing-minecraft-bukkit-saga/ |archive-date=17 October 2014 |access-date=10 March 2016 |website=GamePolitics.com |publisher=Entertainment Consumers Association}}</ref> With Mojang's announcement, the intellectual rights to the project became ambiguous.<ref name="packtpub history" /> Licensing conflicts arose between the original creators of Bukkit and Mojang's maintainers, largely revolving around who "owned" the project after the primary maintainers resigned. One major contributor pulled their code away from the project, forcing Bukkit to fall in a state of disrepair for a time.<ref name="ProgrammableWeb">{{Cite web |last=Wagner |first=Janet |date=24 September 2014 |title=Minecraft Server Software and Modding Plug-Ins Facing Uncertain Future |url=https://www.programmableweb.com/news/minecraft-server-software-and-modding-plug-ins-facing-uncertain-future/analysis/2014/09/24 |access-date=26 March 2020 |website=ProgrammableWeb.com |publisher=ProgrammableWeb |archive-date=26 March 2020 |archive-url=https://web.archive.org/web/20200326212651/https://www.programmableweb.com/news/minecraft-server-software-and-modding-plug-ins-facing-uncertain-future/analysis/2014/09/24 |url-status=live }}</ref><ref name="packtpub history" /><ref name="AsModTurns" /> ===== Malware ===== ''Minecraft'' mods have been an [[attack vector]] of [[malware]] by downloading and running malicious mods.<ref>{{Cite news |last=Goodin |first=Dan |date=7 June 2023 |title=Dozens of popular Minecraft mods found infected with Fracturiser malware |work=[[Ars Technica]] |url=https://arstechnica.com/information-technology/2023/06/dozens-of-popular-minecraft-mods-found-infected-with-fracturiser-malware/ |access-date=8 June 2023 |archive-date=8 June 2023 |archive-url=https://web.archive.org/web/20230608013029/https://arstechnica.com/information-technology/2023/06/dozens-of-popular-minecraft-mods-found-infected-with-fracturiser-malware/ |url-status=live }}</ref><ref name="Bleepingcomputer">{{Cite web |last=Toulas |first=Bill |date=7 June 2023 |title=New Fractureiser malware used CurseForge Minecraft mods to infect Windows, Linux |url=https://www.bleepingcomputer.com/news/security/new-fractureiser-malware-used-curseforge-minecraft-mods-to-infect-windows-linux/ |access-date=8 June 2023 |website=[[Bleeping Computer]] |archive-date=7 June 2023 |archive-url=https://web.archive.org/web/20230607172019/https://www.bleepingcomputer.com/news/security/new-fractureiser-malware-used-curseforge-minecraft-mods-to-infect-windows-linux/ |url-status=live }}</ref> In March 2017, Slovakian cyber company [[ESET]] revealed that 87 examples of [[Trojan horse (computing)|trojan horse]] malware were distributed through the [[Google Play Store]] under the guise of ''Minecraft'' mods. Their purpose was to either display adverts or con players into downloading other apps. Combined, these fake mods gathered over 1,000,000 downloads in the first three months of early 2017.<ref name="TNHTrojans">{{Cite web |last=Iordache |first=Elena |date=24 March 2017 |title=Google Play Store Trojans in Fake Minecraft Mods |url=https://www.tnhonline.com/2017/03/24/google-play-store-trojans-in-fake-minecraft-mods/ |url-status=live |archive-url=https://web.archive.org/web/20181021111623/https://www.tnhonline.com/2017/03/24/google-play-store-trojans-in-fake-minecraft-mods/ |archive-date=21 October 2018 |access-date=27 April 2017 |website=TNH Online}}</ref><ref name="SCMTrojans">{{Cite web |last=Barth |first=Bradley |date=23 March 2017 |title=Nearly a million Minecraft players feel like blockheads after installing fake mod apps |url=https://www.scmagazine.com/nearly-a-million-minecraft-players-feel-like-blockheads-after-installing-fake-mod-apps/article/646022/ |url-status=dead |archive-url=https://web.archive.org/web/20171204123143/https://www.scmagazine.com/nearly-a-million-minecraft-players-feel-like-blockheads-after-installing-fake-mod-apps/article/646022/ |archive-date=4 December 2017 |access-date=27 April 2017 |website=SC Magazine US |publisher=Haymarket Media Group}}</ref> In June 2023, attackers gained access to popular mods and modpacks including "Better Minecraft" and created new releases which contained malware, dubbed "Fractureiser" after the Curseforge account that uploaded it.<ref name="Bleepingcomputer"/><ref>{{Cite news |last=Goodin |first=Dan |date=7 June 2023 |title=Dozens of popular Minecraft mods found infected with Fracturiser malware |work=[[Ars Technica]] |url=https://arstechnica.com/information-technology/2023/06/dozens-of-popular-minecraft-mods-found-infected-with-fracturiser-malware/ |access-date=8 June 2023 |archive-date=8 June 2023 |archive-url=https://web.archive.org/web/20230608013029/https://arstechnica.com/information-technology/2023/06/dozens-of-popular-minecraft-mods-found-infected-with-fracturiser-malware/ |url-status=live }}</ref> In July 2023, an [[Arbitrary code execution|arbitrary code execution]] vulnerability was found in several Forge-based ''Minecraft'' mods such as BdLib and EnderCore. The malware was named "BleedingPipe" by a ''Minecraft'' security community. It takes advantage of mods incorrectly using deserialization in the "ObjectInputStream" class. Although the vulnerability existed since 2017, a blog post by MMPA brought it mainstream, spreading its use before fixes could be made.<ref>{{Cite news |last=Toulas |first=Bill |date=31 July 2023 |title=Hackers exploit BleedingPipe RCE to target Minecraft servers, players |work=[[Bleeping Computer]] |url=https://www.bleepingcomputer.com/news/security/hackers-exploit-bleedingpipe-rce-to-target-minecraft-servers-players/ |access-date=1 August 2023 |archive-date=1 August 2023 |archive-url=https://web.archive.org/web/20230801213222/https://www.bleepingcomputer.com/news/security/hackers-exploit-bleedingpipe-rce-to-target-minecraft-servers-players/ |url-status=live }}</ref><ref>{{Cite news |date=29 July 2023 |title=Bleeding Pipe: A RCE vulnerability exploited in the wild |work=Minecraft Malware Prevention Alliance |url=https://blog.mmpa.info/posts/bleeding-pipe/ |access-date=1 August 2023 |archive-date=1 August 2023 |archive-url=https://web.archive.org/web/20230801213613/https://blog.mmpa.info/posts/bleeding-pipe/ |url-status=live }}</ref>
Summary:
Please note that all contributions to Kiiw may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Kiiw:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information