Feeds

Worm snaffles online gamers' passwords

Nasty attack of reality

Internet Security Threat Report 2014

Players of one fantasy role-playing game Priston Tale1 have suffered a nasty attack of reality after virus writers created a worm programmed to steal their usernames, passwords and data.

The worm - dubbed PrsKey-A - waits for users to enter either Priston Tale or the Yahoo! email system before capturing keystrokes and sending data back to hackers. It is programmed to spread via network shares but other propagation mechanisms, such as tricking fans into downloading the malware, may also be in play.

PrsKey-A hasn't spread much so far so the attack is noteworthy for what it tells us about the motives of virus writers rather than the threat it poses to the average Windows user, which is a lot less than the recent spate of Plug and Play worms, for example. That said, attacks by hackers against Priston Tale users have caused enough problems for administrators running to game to temporarily suspend trading in user accounts. Antivirus experts reckon that the malware is been used to rake in money rather than rack up high scores.

"More malware is being written that not only causes disruption, but also steals registration keys, passwords and data from players of computer games," said Graham Cluley, senior technology consultant for Sophos. "In many cases the virtual weapons, cash and armour needed for such games are then sold in the real world, where there's a growing demand from online gaming fanatics. If gamers buy these virtual goods online they should be careful not to purchase them from internet criminals."

The creation of malware to steal from online games is becoming a growing trend. Other popular multi-player online games whose players have been targeted by viruses and Trojan horses in the past include Lineage, Outwar and Legend of Mir 2. Last month a group of people were arrested in South Korea over allegations that they spread password stealing programs in order to steal the resources of online gamers. ®

1Priston Tale is a 3D fantasy multi-player game which involves fighting monsters and is played online. The game has millions of subscribers across the globe, many of them based in South Korea, where the game originated. Other fans are based in Japan, China, Taiwan, Thailand and various English-speaking countries.

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.