Feeds

Warcraft gamers locked out after Trojan attack

Keylog catastrophe

Providing a secure and efficient Helpdesk

Keylogging scammers are once again laying siege to World of Warcraft gamers.

In latest attack, malware designed to steal user names and passwords from World of Warcraft players has been planted on maliciously constructed websites that pose as repositories for gaming advice.

Unprotected Windows users visiting these sites can get infected through malicious browser pop-ups. The malware also spreads through infectious emails, game forums, in-game chat, and other mediums. The culprit of the latest attack is a variant of PE-Looked (a strain that normally targets the popular online game Lineage), a representative from Trend Micro told The Sydney Morning Herald.

The latest attack sparked a warning from Eilanai, a moderator on the World of Warcraft forum explaining how gamers might protect themselves from key logging scammers.

Many WoW gamers have been hit by the scam and a good number are having difficulty getting access to their account, even after following the instructions of Blizzard Entertainment, the game's developer. "As there are many players affected by this issue, it may take some time for our Account Administration team to reach your issue and verify your ownership, so please be patient while waiting for a response," Eilanai wrote in response to an earlier forum thread on the issue.

The problem flared up a week ago and is yet to be fully resolved, sparking complaints from World of Warcraft participants such as Reg reader Darren that gamers are paying for a service they are unable to access.

"Blizzard are still billing me for it even though I can't login into the game and use it. I've also telephoned the account and billing helpline three times and got no where at all. On my third telephone call yesterday, I was told by a message that the telephone lines were closed to due the amount of calls and waiting time," he told us.

Blizzard Entertainment did not respond to our requests for comment, at time of writing.

Virtual gold and other booty obtained via compromised World of Warcraft accounts can be converted to cash but it's unclear if this is the motive of the attack.

In May, virus writers created Wowcraft another Trojan targeting the World of Warcraft community which, as with the latest assault, infected users by drive-by downloads.

Other attacks (example here) try to steal the identities of players of other online games. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.