Feeds

Second life plagued by 'grey goo' attack

Viruses go virtual

The Power of One eBook: Top reasons to choose HP BladeSystem

For about two hours, the virtual landscape of Second Life filled with golden rings and the distinctive two-tone ding of Sega's popular Sonic the Hedgehog games.

The rings' listed creator was the fictional "Dr Robotnik," a character from the Sonic games. However, the deluge of rings was not some form of cross promotion, but a viral attack of self-replicating objects, known less than affectionately as "grey goo."

"The rings were flying from every direction - there were an incredible amount them," one in-game observer, who asked only to be identified by his avatar's name "Amulius Lioncourt," said in an interview with SecurityFocus.

In a video that Lioncourt made from screen captures, the rings spun on the ground and streaked through the sky. The distinctive Sonic the Hedgehog sound punctuated the video every few seconds. The attack left the servers responding slowly, resulting in a variety of side effects, including unreliable account balances, disappearing clothes, and shutting down in-game teleportation, which digital inhabitants use to get around quickly, according to Linden Lab, the creator of Second Life.

"The problem seems to be tied to heavy load on the database," the company said on its Second Life forum on Sunday.

Within 15 minutes, Linden Lab detected the outbreak and cleaned out the servers, although it took about two hours to get everything back to semblance of normal, according to a timeline in the forum posts. The response - the fastest yet, in Lioncourt's experience - showed that the company has started to gain experience in combating such attacks.

It's experience that will likely be necessary in the future.

As virtual worlds bring together a greater number of people and become increasingly interactive, virus writers and other malicious coders will likely focus more effort in attacking such online meeting places. Second Life has already suffered three major attacks since September, each time being overrun by quickly reproducing digital objects. In October, a series of attacks - one incorporating bouncing beach balls with processor-taxing particle effects - made the online lives of Second Life's residence stuttering and sometimes brief, as the company took down servers to clean them out.

Linden Lab is not the only firm that has to deal with such problems. In the World of Warcraft, Blizzard Entertainment's hit massively multiplayer online role-playing game (MMORPG), a digital disease created last year was spread beyond its intended area to the online world at large by griefers intent on killing other players' in-game avatars. While the disease had been added by Blizzard developers, several players discovered the implementation flaw and used the disease to attack other players in the world.

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.