Feeds

Splinter Cell hack smells more like publicity stunt

Pwn or PR?

The Power of One Brief: Top reasons to choose HP BladeSystem

Ubisoft said that the website of its popular video game Splinter Cell had been hacked on Thursday. However circumstantial evidence suggests the hack is more likely to be a publicity stunt than a genuine cyber assault.

Visitors to the Splinter Cell website are been greeted by a message in Russian. This is followed a bit.ly link buried in the message, which leads on to a page displaying the ASCII art of a shield with a double-headed eagle, also on the Splinter Cell site.

The arty effort looks more like an Easter Egg than the sort of things real cybercrooks typically spray on compromised sites, which usually include rants, abuse, political messages, greetings to other hackers and the like.

Ubisoft "confirmed" the Splinter Cell website had been "pwned" in a Twitter posting hours ago but is yet to take down the ostensible defaced site or do anything about the supposed hack. Security experts are doubtful that the attack is genuine, speculating that it's probably a hoax.

"If it is a publicity stunt it's probably not the wisest that there has ever been - a hoax like this can panic users into believing there is a genuine security problem, and panic can lead internet users to make bad decisions," said Graham Cluley, senior technology consultant at anti-virus firm Sophos, in a blog post here.

Rik Ferguson of Trend Micro also expressed scepticism about whether a genuine attack had actually taken place in a Twitter update here. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.