Feeds

Splinter Cell hack smells more like publicity stunt

Pwn or PR?

Choosing a cloud hosting partner with confidence

Ubisoft said that the website of its popular video game Splinter Cell had been hacked on Thursday. However circumstantial evidence suggests the hack is more likely to be a publicity stunt than a genuine cyber assault.

Visitors to the Splinter Cell website are been greeted by a message in Russian. This is followed a bit.ly link buried in the message, which leads on to a page displaying the ASCII art of a shield with a double-headed eagle, also on the Splinter Cell site.

The arty effort looks more like an Easter Egg than the sort of things real cybercrooks typically spray on compromised sites, which usually include rants, abuse, political messages, greetings to other hackers and the like.

Ubisoft "confirmed" the Splinter Cell website had been "pwned" in a Twitter posting hours ago but is yet to take down the ostensible defaced site or do anything about the supposed hack. Security experts are doubtful that the attack is genuine, speculating that it's probably a hoax.

"If it is a publicity stunt it's probably not the wisest that there has ever been - a hoax like this can panic users into believing there is a genuine security problem, and panic can lead internet users to make bad decisions," said Graham Cluley, senior technology consultant at anti-virus firm Sophos, in a blog post here.

Rik Ferguson of Trend Micro also expressed scepticism about whether a genuine attack had actually taken place in a Twitter update here. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.