DMA Anticheat Evolution Timeline Since PCILeech (2016)

2016

PCILeech release by Frisk.

A DMA attack framework enabling external devices to access memory over PCIe. Unlocking DMA attack to the mass. https://github.com/ufrisk/pcileech

2017

BattleEye (BE) implements master abort detection and detects stock pcileech-fpga via VID/PID.

Issue: Led to false positives, as legitimate hardware configurations like a Artix7 capture card or a XHCI could trigger false positives and detections.

2018

Easy Anti-Cheat (EAC) starts signing Xilinx7 configuration space (blocks 40 and 60) and detects stock pcileech-fpga via VID/PID.

Issue: Bypassed by slightly shifting the PCIe capability pointer, allowing cheaters to evade detection mechanism.

Issue 2: Legal Artix7 devices could cause false positives.

2019

FACEIT detects stock pcileech-fpga via VID/PID and configuration space heuristics.

Issue: Easily bypassed by changing VID/PID values, a straightforward modification.

2019

FACEIT detect invisible firmware.

Issue: Easily bypassed if you null shadow cfg space aswell.

2018-2022

pcileech-multimedia-hd is undetected and abused at pro level.

Issue: Shared with German, causing file to be spread and leaked in small circle. Fuck asdf144. Abusing false positive, donor device using a Xilinx 7 chipset and sharing same configuration space as pcileech-fpga

2022

Valorant Vanguard (VGK) attempts to prevent devices without drivers by flipping Bus Master Enable (BME).

Issue: Bypassed by installing a driver or dummy driver to satisfy the requirement.

2022

VGK implements is_interrupted mechanism.

Issue: Bypassed by disabling/removing MSI capability.

Issue 2: People figured out how to send interrupts eventually after reading Xilinx docs, though 3 years later.

Issue 3: Could potentially eventually break the way they enumerate devices with configuration space tricks.

2022

FACEIT prevents all Xilinx7 devices (except x4 lane ones).

Issue: Easily evaded for people who got control of configuration space back days, but most of people were not educated enough.

2022

VGK prevents invisible firmware.

It evaded the enumeration.

2022-2023

Latency check by FACEIT.

Issue: Easily evaded for people who got control of configuration space back days, but most of people were not educated enough.

2023

VGK disables and prevents Elgato MK2 Capture card due to excesses by some players.

(Hi) – High impact on legitimate users due to DMA abuses.

03/2023

drvscan release by ekknod.

Before this point, detection against DMA was almost non-existent. And the firmware market was a pure meme and full of scammers : apekros was selling nulled configuration space as full emulation for half a salary. https://www.unknowncheats.me/forum/anti-cheat-bypass/623940-nulled-config-space-pcileech-fpga-firmware-hot-vgk-bypass.html

2023

ACE detects FPGA firmware spoofed as x16 PCIe device but upper lanes negotiated at x1.

Issue: Can happen with some real devices made in 1990 that don't follow the specs.

07/2023

pcileech-wifi source code release, unlocking knowledge to the mass (PIO, emulation etc...).

Public release democratizing device "emulation", ekknod released and showed how to use PIO for BAR support.

08/2023

FACEIT prevents all Xilinx7 devices (including original capture cards like Avermedia GC573) due to some excess at top level by dumb users.

Prevention caused by dumb user who plugged HWID banned wifi card from the past, leading him to 1) get inspected more deeply. 2) get banned after years undetected

2023

pcileech-multimedia (spartan6)

Firmware file released somehwere by ekknod and abused massively on faceit for around 4-5 months without causing ANY BANS.

End 2023

FACEIT prevents device by VID/PID, totally blocking original device (in use)

Faceit prevent public pcileech-wifi project, by blacklisting the VID/PID

Jan 2024

People just noticed the is_interrupted mechanism from VGK.

Honestly, good work.

2024

VGK starts experimenting A/B tests (e.g., is WiFi connected, is XHCI have child, is NIC connected, etc. for each device types).

Issue: Experimental, can just change class code/device type to avoid.

2024

VGK detecting most of configuration space tricks (ILLEGAL FW).

Rogue multifunction device, rogue bridge device, breathing fw etc.. used to evade enumeration.

05/2024

FACEIT prevents public firmware via VID/PID (e.g., pcileech wifi v2 to v161, bypassing FACEIT 161 times, requiring manual blocks for each VID/PID).

An attempt to block public DMA firmware, but cheaters iterated VID/PID changes rapidly, forcing repeated manual interventions.

05/2024

ekknod multimedia source code release, based on spartan6 donor device, used to bypass FACEIT publicly, unlocking knowledge to the mass.

Project was private before. Open-source release enabling public bypasses and educating the community on DMA and the scam market with marketing warrior. Showing how a 1:1 device should be.

07/2024

Shadow configuration space detection mechanism by EAC/ACE.

People started implementing correct read/write configuration space behaviors or disabling shadow configuration space to bypass this specific mechanism.

12/2024

Another shadow configuration space detection mechanism by EAC/ACE (gummy bear on steroid).

Ithalove fw on top at this time. JAJAJAJA godbin

12/2024

VGK continue experimenting massive A/B tests, disabling and preventing nvme without disk init.

Everdox have more tricks in his pocket than you think.

2024

ACE starting attack BAR from public firmware, gathering massive amount of data.

R/W behavior in BAR, special detection against public firmware

01/2025

VGK/EAC detects FPGA spoofed as XHCI with sub device, with massive A/B functionality tests.

Uses randomized A/B testing to identify spoofed USB controllers for DMA cheats.

02/2025

FACEIT loading custom IOMMU configuration at >4k elo

Who gonna pentest at this level anyways ?

02/2025

Ditto release - Pcie emulator

Nvidia USB HUB firmware with child device

03/2025

VGK detect ditto causing massive banwawe

Huh

04/2025

EAC detect ditto causing massive banwawe

Huh

05/2025

FACEIT detect ditto causing 6 bans

Huh

2025

VGK/EAC detects FPGA spoofed as WiFi card with fake packet, with massive A/B functionality tests.

Employs fake packets and A/B testing to expose spoofed WiFi hardware used in DMA.

03/2025

VGK/EAC detects FPGA spoofed as NIC with fake packet, with massive A/B functionality tests.

Targets spoofed network interface cards via fake packets and randomized testing.

04/2025

VGK/EAC detects FPGA spoofed as audio device with fake sub-audio and codec emulation, with massive A/B functionality tests.

Detects spoofed audio devices through fake data packets and A/B testing methodologies.

04/2025

Hybrid Pcie Trace Tools / introduction

MITM device - - passthought - compatible pcileech

05/2025

Heino2 introduction to the market

MITM device - passthought

05/2025

VGK/ACE prevent and detect the NVME VMD trick.

Issue: PXE results in a fully invisible VMD, specific system configuration allowing some bypasses.

05/2025

EAC prevents invisible firmware.

It evaded the enumeration.

06/2025

EAC are able to scan under TB4 and prevent Thunderbolt enclosure based attack

It evaded the enumeration.

07/2025

VGK are able to scan under TB4 and prevent Thunderbolt enclosure based attack

It evaded the enumeration.

2025

EAC/VGK implemented is_current_nic, disabling 2 NIC setups.

Allowing only 1 NIC to work, the one the game use. The second one can be legal and connected, will be prevented safely.

06/2025

ACE implements proper IOMMU detection mechanism.

Enhanced detection mechanism leverage IOMMU configurations to counter DMA hardware threats. Causing massive banwawe, detecting heino2/hptt usage.

06/2025

VGK implements honeypotted memory region targeting specific cheats.

Uses decoy memory areas to trap and detect DMA-based cheating attempts, causing paranoia in the cheating scene about what is detected. Causing massive banwawe.

07/2025

EAC detects FPGA spoofed as capture card, with massive A/B functionality tests.

Detects spoofed capture card device through data packets and A/B testing methodologies.

08/2025

VGK implements proper IOMMU prevention and detection mechanism.

Strengthens defenses against DMA attacks by enforcing and verifying IOMMU isolation. Able to log any attempts your device are trying and prevent it aswell. Detecting HPTT/heino2 usage.

08/2025

EAC continue experimenting massive A/B tests, disabling and preventing SATA without disk init and some others.

Included driver swap work arounds.

08/2025

FACEIT implements IOMMU prevention and detection mechanism.

Aims to block DMA. But causing legit users to BSOD. It's a nice implementation. Detecting HPTT/heino2 usage.

09/2025

People trying to circumvent IOMMU mechanism with bootkit or hypervisor.

Nulling the whole point of being totally external to the main system..

Getting users to launch potential dangerous, infected and unsigned bootkit, will lead to users credidentials stolens.