Feeds

Warcraft gamers locked out after Trojan attack

Keylog catastrophe

Beginner's guide to SSL certificates

Keylogging scammers are once again laying siege to World of Warcraft gamers.

In latest attack, malware designed to steal user names and passwords from World of Warcraft players has been planted on maliciously constructed websites that pose as repositories for gaming advice.

Unprotected Windows users visiting these sites can get infected through malicious browser pop-ups. The malware also spreads through infectious emails, game forums, in-game chat, and other mediums. The culprit of the latest attack is a variant of PE-Looked (a strain that normally targets the popular online game Lineage), a representative from Trend Micro told The Sydney Morning Herald.

The latest attack sparked a warning from Eilanai, a moderator on the World of Warcraft forum explaining how gamers might protect themselves from key logging scammers.

Many WoW gamers have been hit by the scam and a good number are having difficulty getting access to their account, even after following the instructions of Blizzard Entertainment, the game's developer. "As there are many players affected by this issue, it may take some time for our Account Administration team to reach your issue and verify your ownership, so please be patient while waiting for a response," Eilanai wrote in response to an earlier forum thread on the issue.

The problem flared up a week ago and is yet to be fully resolved, sparking complaints from World of Warcraft participants such as Reg reader Darren that gamers are paying for a service they are unable to access.

"Blizzard are still billing me for it even though I can't login into the game and use it. I've also telephoned the account and billing helpline three times and got no where at all. On my third telephone call yesterday, I was told by a message that the telephone lines were closed to due the amount of calls and waiting time," he told us.

Blizzard Entertainment did not respond to our requests for comment, at time of writing.

Virtual gold and other booty obtained via compromised World of Warcraft accounts can be converted to cash but it's unclear if this is the motive of the attack.

In May, virus writers created Wowcraft another Trojan targeting the World of Warcraft community which, as with the latest assault, infected users by drive-by downloads.

Other attacks (example here) try to steal the identities of players of other online games. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.