Feeds

Worm snaffles online gamers' passwords

Nasty attack of reality

Protecting users from Firesheep and other Sidejacking attacks with SSL

Players of one fantasy role-playing game Priston Tale1 have suffered a nasty attack of reality after virus writers created a worm programmed to steal their usernames, passwords and data.

The worm - dubbed PrsKey-A - waits for users to enter either Priston Tale or the Yahoo! email system before capturing keystrokes and sending data back to hackers. It is programmed to spread via network shares but other propagation mechanisms, such as tricking fans into downloading the malware, may also be in play.

PrsKey-A hasn't spread much so far so the attack is noteworthy for what it tells us about the motives of virus writers rather than the threat it poses to the average Windows user, which is a lot less than the recent spate of Plug and Play worms, for example. That said, attacks by hackers against Priston Tale users have caused enough problems for administrators running to game to temporarily suspend trading in user accounts. Antivirus experts reckon that the malware is been used to rake in money rather than rack up high scores.

"More malware is being written that not only causes disruption, but also steals registration keys, passwords and data from players of computer games," said Graham Cluley, senior technology consultant for Sophos. "In many cases the virtual weapons, cash and armour needed for such games are then sold in the real world, where there's a growing demand from online gaming fanatics. If gamers buy these virtual goods online they should be careful not to purchase them from internet criminals."

The creation of malware to steal from online games is becoming a growing trend. Other popular multi-player online games whose players have been targeted by viruses and Trojan horses in the past include Lineage, Outwar and Legend of Mir 2. Last month a group of people were arrested in South Korea over allegations that they spread password stealing programs in order to steal the resources of online gamers. ®

1Priston Tale is a 3D fantasy multi-player game which involves fighting monsters and is played online. The game has millions of subscribers across the globe, many of them based in South Korea, where the game originated. Other fans are based in Japan, China, Taiwan, Thailand and various English-speaking countries.

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.