Feeds

Worm snaffles online gamers' passwords

Nasty attack of reality

Build a business case: developing custom apps

Players of one fantasy role-playing game Priston Tale1 have suffered a nasty attack of reality after virus writers created a worm programmed to steal their usernames, passwords and data.

The worm - dubbed PrsKey-A - waits for users to enter either Priston Tale or the Yahoo! email system before capturing keystrokes and sending data back to hackers. It is programmed to spread via network shares but other propagation mechanisms, such as tricking fans into downloading the malware, may also be in play.

PrsKey-A hasn't spread much so far so the attack is noteworthy for what it tells us about the motives of virus writers rather than the threat it poses to the average Windows user, which is a lot less than the recent spate of Plug and Play worms, for example. That said, attacks by hackers against Priston Tale users have caused enough problems for administrators running to game to temporarily suspend trading in user accounts. Antivirus experts reckon that the malware is been used to rake in money rather than rack up high scores.

"More malware is being written that not only causes disruption, but also steals registration keys, passwords and data from players of computer games," said Graham Cluley, senior technology consultant for Sophos. "In many cases the virtual weapons, cash and armour needed for such games are then sold in the real world, where there's a growing demand from online gaming fanatics. If gamers buy these virtual goods online they should be careful not to purchase them from internet criminals."

The creation of malware to steal from online games is becoming a growing trend. Other popular multi-player online games whose players have been targeted by viruses and Trojan horses in the past include Lineage, Outwar and Legend of Mir 2. Last month a group of people were arrested in South Korea over allegations that they spread password stealing programs in order to steal the resources of online gamers. ®

1Priston Tale is a 3D fantasy multi-player game which involves fighting monsters and is played online. The game has millions of subscribers across the globe, many of them based in South Korea, where the game originated. Other fans are based in Japan, China, Taiwan, Thailand and various English-speaking countries.

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?