Technical

What Is Hypervisor-Based Cheating?

Hypervisor-based cheating uses a thin Type-1 hypervisor (like a customized minimal version of KVM or a hand-rolled VT-x/AMD-V implementation) that loads before Windows, paravirtualizes the host OS, and operates at a higher privilege level than ring 0. The anti-cheat runs as a guest in the hypervisor's controlled environment, while the cheat operates from the hypervisor itself — invisible to ring-0 AC drivers. It is expensive, technically demanding, and structurally outside the consumer cheat market.

RawCheats Anti-Cheat Research Team — Anti-Cheat Research TeamUpdated May 12, 2026

Hypervisor-based cheating sits at the technical extreme of the cheat-development spectrum. It''s the answer to "what beats a kernel anti-cheat?" — operate at a privilege level above ring 0, in the CPU''s virtualization extensions, where ring-0 code cannot directly observe you. The cost of doing this correctly is high enough that the technique is almost entirely confined to small private circles and research environments.

The CPU privilege model with virtualization

Intel VT-x and AMD-V add a privilege level above ring 0: the root mode or VMX root state, where a hypervisor runs. When a hypervisor is loaded, ring 0 code (including Windows kernel and AC drivers) runs in VMX non-root mode — it''s effectively a guest of the hypervisor, even though it doesn''t necessarily know it. The hypervisor can intercept CPU instructions, page-table modifications, MSR accesses, and I/O operations from its guest. From the guest''s perspective, the hypervisor is invisible unless it deliberately reveals itself.

How a hypervisor cheat works

A minimal Type-1 hypervisor cheat:

  1. Loads early in the boot chain (often via UEFI driver or DXE phase code) — Secure Boot makes this much harder; the cheat needs a signed entry point
  2. Configures VMX/SVM and creates a virtual CPU for the host OS
  3. Boots Windows as a guest, with the host OS unaware it''s now running virtualized
  4. Establishes Extended Page Tables (EPT) so the cheat can remap memory views — the AC sees one version of memory, the cheat sees another
  5. Implements game-memory reading or input injection from the hypervisor, where AC kernel drivers structurally cannot reach
  6. Hides itself from CPUID-based VM detection and timing-based VM detection (the harder part)

The result: an anti-cheat running at ring 0 inside Windows cannot directly see or block the hypervisor-level code. The hypervisor is, from the perspective of the AC, "below" everything else.

Why this is hard

  • Modern Secure Boot blocks unsigned UEFI components, so the hypervisor cheat needs either a leaked signing certificate, a vulnerability in a signed UEFI module, or operates only on systems with Secure Boot disabled (which itself is detectable by AC)
  • VM detection by ACs is mature. CPUID, rdtsc timing, MSR inconsistencies, device IDs, SMBIOS strings — hiding all of them is non-trivial
  • EPT manipulation is complex. Implementing correct memory virtualization without breaking the guest OS, while still allowing useful cheat reads, requires deep expertise in CPU virtualization extensions
  • TPM and Pluton attestation include boot-state measurements via PCRs. A modified boot chain (which a hypervisor cheat is) produces different PCR values, which attestation-aware AC will detect
  • Performance overhead is real. Naive hypervisors slow the host meaningfully; production-quality cheat hypervisors require careful optimization to avoid noticeable lag

The combination of these factors makes hypervisor cheating a research project rather than a mass-market cheat technique.

Who actually does this

Hypervisor cheating exists in:

  • Academic and security research (papers like the hyper-reV project, BluePill-derived work, various university research on hypervisor-based forensics)
  • Small private cheat groups with the technical skill to maintain custom hypervisors against AC arms-race pressure
  • High-end Russian and Eastern European cheat shops that occasionally release hypervisor-based products for $500-2000+/month price points
  • Specific use cases like tournament-tier cheating where the value of detection-resistance justifies the investment

This is not the consumer cheat market that RawCheats, BattleLog, SkyCheats, or Phantom Overlay serve.

The Anti-Cheat response

ACs are increasingly TPM-attestation-aware specifically to defeat hypervisor cheating. If the attestation flow validates PCRs that measure the entire boot chain, a hypervisor inserted before Windows produces wrong PCRs and the attestation fails. This is why Vanguard, EAC (heavy mode), and Ricochet (BO7) are converging on attestation as the canonical defense — a hypervisor cheat that defeats kernel detection cannot defeat cryptographic boot-state measurement signed by the TPM.

What hypervisor cheating delivers

  • Memory reads invisible to ring-0 AC
  • Input injection invisible to ring-0 AC
  • Survival against signature scanning (the hypervisor itself isn''t in scanned memory)
  • A platform for more advanced features (selective rendering, hardware-level overlay)

What it doesn''t deliver

  • Defense against TPM attestation flows (cryptographically measured boot state)
  • Defense against behavioral ML (if you''re using the cheat to play noticeably better, ML still sees it)
  • Defense against server-side replay validation (the game server doesn''t care how clean your local AC bypass is if your view-angle history shows you couldn''t have legitimately seen what you shot)
  • Defense against HWID correlation across ban waves

Practical impact

Hypervisor cheating is technically real, expensive, niche, and increasingly squeezed by attestation. RawCheats does not operate in this space — our model is external software cheats with rigorous HWID hygiene via Raw Spoofer and tournament-tier behavioral tuning. For 99% of cheaters, hypervisor approaches are out of reach and unnecessary; conventional cheats with proper operational discipline are the better trade-off.

Forward look

Hypervisor cheating''s future is closing as attestation matures. Within 24-36 months, attestation-gated AAA shooters will make hypervisor approaches structurally non-viable unless the attacker can also defeat the hardware root of trust — which means physical CPU modification or vulnerability research at the silicon level. The era when "load a hypervisor and beat the AC" was a viable cheat-development direction is ending. Pair with our DMA cheats guide for the parallel technical-tier story.

Related Questions

How Do Anti-Cheats Detect Virtual Machines?

Anti-cheats detect virtual machines through CPUID hypervisor bits, timing attacks against rdtsc/rdtscp instructions, MSR (Model Specific Register) inconsistencies, device enumeration (VirtIO/VMware/Hyper-V device IDs), SMBIOS strings revealing virtualization (VMware Inc, QEMU, innotek GmbH, Microsoft Corporation), and behavioral patterns (typing timing, mouse-event distributions inconsistent with native input). Most AAA anti-cheats block VM-based play entirely — Vanguard, EAC (in heavy-protection mode), and Ricochet all reject VM environments.

What Is a Kernel-Level Anti-Cheat?

A kernel-level anti-cheat is anti-cheat software that runs in ring 0 — the same privilege level as the Windows kernel — via a signed driver loaded into the OS. This gives it visibility into all processes, threads, drivers, kernel callbacks, and physical memory on the system. Examples: Easy Anti-Cheat (EAC), BattlEye (BEDaisy.sys), Riot Vanguard (vgk.sys), Activision Ricochet, NeacSafe, Zakynthos. Defense Matrix and VAC are NOT kernel-level — they run in user mode.

What Is DMA Cheating and How Does It Work?

DMA (Direct Memory Access) cheating uses an FPGA-based PCIe card (Xilinx Spartan-6, Artix-7, Kintex-7) plugged into a secondary "victim" PC to read game memory directly via bus-master DMA, while a "host" PC processes the data and displays cheats. The game PC sees no cheat software locally because the cheating runs on a separate machine. IOMMU enforcement in 2026 (Fortnite Feb 19 mandate, Vanguard, BattlEye titles) killed the cheap DMA market by blocking unauthorized device-to-memory reads.

What Is Microsoft Remote Attestation?

Microsoft Remote Attestation is a Windows platform feature that lets a remote server cryptographically verify a client device''s identity, boot state, and configuration using the TPM 2.0 endorsement key (EK) certificate plus signed boot-log measurements. The TPM signs an attestation quote with a hardware-protected key, the server validates it against the TPM vendor''s CA, and the result is a non-spoofable answer to "is this machine in a trusted state?" Adopted by Call of Duty Black Ops 7 and increasingly by AAA anti-cheats in 2026.

Raw Fortnite
Live purchase·5m ago
dezz from US bought Raw Fortnite