Traditional hacker voices38 officially broke through the D encryption protection of the domestic action game "Black Myth: Wukong". Previously, the DenuvOwO team had cracked the game using a virtual machine management system. voices38 expressed its gratitude to its peers for the cracking solution, but pointed out that for this game, the solution is no longer needed. The game was originally dual protected by Steam + Denuvo.


Previously, D Members of the enuvOwO team have said that voice38 is working on solving D encryption attacks on three major games. Now the first one is a heavyweight, and players can't help but look forward to what kind of games the next two games will be.
Recently, D-encrypted games have been hit one after another. Hacker groups quickly cracked them using the new vulnerability "Hypervisor Bypass". This method can bypass the game as soon as it is launched. Masterpieces such as "Red Desert" and "Resident Evil 9: Requiem" were not spared.

Irdeto, the parent company of D encryption, confirmed that it is aware of the cracking method and is actively responding to it. New response measures will be introduced, but the specific content is not clear. Daniel Butschek, director of communications at Irdeto, said: "We are developing security updates for the affected games and will not affect player game performance." These measures will not allow D encryption to penetrate deep into the Windows kernel, nor will it be upgraded to Ring-1 or deeper kernel levels.
Butschek believes that the hypervisor approach has serious security risks. It requires the installation of a custom self-signed hypervisor and the main Windows security protection functions must be turned off when running. These functions are designed to prevent kernel-level malware, rootkits and ransomware.

It is worth mentioning that D Encryption Company and 2K Company have implemented new operation restriction mechanisms for a number of games, including "NBA 2K25", "NBA 2K26" and "Marvel's Children of the Night". These games now use a fixed offline authorization token mechanism that automatically expires after approximately 14 days, regardless of whether the player changes hardware or operating systems. Once the token expires, the game will not be able to start and players must reconnect to the Internet to obtain a new authorization token before they can continue playing.
This mechanism is tightened compared to the previous version of Denuvo. Previous versions usually only required re-networking verification when major system changes were detected, while the new mechanism forces verification on a regular basis, even for stand-alone content.