Feeds

Warcraft gamers locked out after Trojan attack

Keylog catastrophe

Reducing security risks from open source software

Keylogging scammers are once again laying siege to World of Warcraft gamers.

In latest attack, malware designed to steal user names and passwords from World of Warcraft players has been planted on maliciously constructed websites that pose as repositories for gaming advice.

Unprotected Windows users visiting these sites can get infected through malicious browser pop-ups. The malware also spreads through infectious emails, game forums, in-game chat, and other mediums. The culprit of the latest attack is a variant of PE-Looked (a strain that normally targets the popular online game Lineage), a representative from Trend Micro told The Sydney Morning Herald.

The latest attack sparked a warning from Eilanai, a moderator on the World of Warcraft forum explaining how gamers might protect themselves from key logging scammers.

Many WoW gamers have been hit by the scam and a good number are having difficulty getting access to their account, even after following the instructions of Blizzard Entertainment, the game's developer. "As there are many players affected by this issue, it may take some time for our Account Administration team to reach your issue and verify your ownership, so please be patient while waiting for a response," Eilanai wrote in response to an earlier forum thread on the issue.

The problem flared up a week ago and is yet to be fully resolved, sparking complaints from World of Warcraft participants such as Reg reader Darren that gamers are paying for a service they are unable to access.

"Blizzard are still billing me for it even though I can't login into the game and use it. I've also telephoned the account and billing helpline three times and got no where at all. On my third telephone call yesterday, I was told by a message that the telephone lines were closed to due the amount of calls and waiting time," he told us.

Blizzard Entertainment did not respond to our requests for comment, at time of writing.

Virtual gold and other booty obtained via compromised World of Warcraft accounts can be converted to cash but it's unclear if this is the motive of the attack.

In May, virus writers created Wowcraft another Trojan targeting the World of Warcraft community which, as with the latest assault, infected users by drive-by downloads.

Other attacks (example here) try to steal the identities of players of other online games. ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.