Feeds

Worm snaffles online gamers' passwords

Nasty attack of reality

3 Big data security analytics techniques

Players of one fantasy role-playing game Priston Tale1 have suffered a nasty attack of reality after virus writers created a worm programmed to steal their usernames, passwords and data.

The worm - dubbed PrsKey-A - waits for users to enter either Priston Tale or the Yahoo! email system before capturing keystrokes and sending data back to hackers. It is programmed to spread via network shares but other propagation mechanisms, such as tricking fans into downloading the malware, may also be in play.

PrsKey-A hasn't spread much so far so the attack is noteworthy for what it tells us about the motives of virus writers rather than the threat it poses to the average Windows user, which is a lot less than the recent spate of Plug and Play worms, for example. That said, attacks by hackers against Priston Tale users have caused enough problems for administrators running to game to temporarily suspend trading in user accounts. Antivirus experts reckon that the malware is been used to rake in money rather than rack up high scores.

"More malware is being written that not only causes disruption, but also steals registration keys, passwords and data from players of computer games," said Graham Cluley, senior technology consultant for Sophos. "In many cases the virtual weapons, cash and armour needed for such games are then sold in the real world, where there's a growing demand from online gaming fanatics. If gamers buy these virtual goods online they should be careful not to purchase them from internet criminals."

The creation of malware to steal from online games is becoming a growing trend. Other popular multi-player online games whose players have been targeted by viruses and Trojan horses in the past include Lineage, Outwar and Legend of Mir 2. Last month a group of people were arrested in South Korea over allegations that they spread password stealing programs in order to steal the resources of online gamers. ®

1Priston Tale is a 3D fantasy multi-player game which involves fighting monsters and is played online. The game has millions of subscribers across the globe, many of them based in South Korea, where the game originated. Other fans are based in Japan, China, Taiwan, Thailand and various English-speaking countries.

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.