Feeds

Warcraft gamers locked out after Trojan attack

Keylog catastrophe

Secure remote control for conventional and virtual desktops

Keylogging scammers are once again laying siege to World of Warcraft gamers.

In latest attack, malware designed to steal user names and passwords from World of Warcraft players has been planted on maliciously constructed websites that pose as repositories for gaming advice.

Unprotected Windows users visiting these sites can get infected through malicious browser pop-ups. The malware also spreads through infectious emails, game forums, in-game chat, and other mediums. The culprit of the latest attack is a variant of PE-Looked (a strain that normally targets the popular online game Lineage), a representative from Trend Micro told The Sydney Morning Herald.

The latest attack sparked a warning from Eilanai, a moderator on the World of Warcraft forum explaining how gamers might protect themselves from key logging scammers.

Many WoW gamers have been hit by the scam and a good number are having difficulty getting access to their account, even after following the instructions of Blizzard Entertainment, the game's developer. "As there are many players affected by this issue, it may take some time for our Account Administration team to reach your issue and verify your ownership, so please be patient while waiting for a response," Eilanai wrote in response to an earlier forum thread on the issue.

The problem flared up a week ago and is yet to be fully resolved, sparking complaints from World of Warcraft participants such as Reg reader Darren that gamers are paying for a service they are unable to access.

"Blizzard are still billing me for it even though I can't login into the game and use it. I've also telephoned the account and billing helpline three times and got no where at all. On my third telephone call yesterday, I was told by a message that the telephone lines were closed to due the amount of calls and waiting time," he told us.

Blizzard Entertainment did not respond to our requests for comment, at time of writing.

Virtual gold and other booty obtained via compromised World of Warcraft accounts can be converted to cash but it's unclear if this is the motive of the attack.

In May, virus writers created Wowcraft another Trojan targeting the World of Warcraft community which, as with the latest assault, infected users by drive-by downloads.

Other attacks (example here) try to steal the identities of players of other online games. ®

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.