Feeds

Scammers exploit wannabe demon-slayers hyped by Diablo III

Go straight to hell

Remote control for virtualized desktops

Cybercrooks latched onto the release of Diablo III on Monday with a run of scams themed around the widely anticipated video game.

Blizzard's games systems collapsed due to the higher than expected demand for the demon-slaying game, The Guardian reports.

The software company is attempting to stop pirates from nicking the new game by forcing wannabe warriors to log into its servers before they can start playing the role-playing game, even if they only want to try a single-player offline campaign.

This has created a bottleneck centered around log-in systems at Blizzard, which has struggled to service demand.

Technical glitches at Blizzard were an unexpected bonus for scammers, who have launched a raft of scams featuring the promotion of bogus crack and keygen sites. These fake sites might potentially be more attractive than they normally would be as gamers struggle to get their hands on legitimate content through regular channels.

Some of the scam sites that GFI Software has identified include supposed online key purchasing websites, that actually install dodgy software on the users' PC. Other spammy Diablo 3-themed links collated by the security firm actually lead to unrelated flash games, spam linkdumps and a “donation experiment” where installs of the software on offer enter marks into a supposed prize draw giveaway. Other shenanigans on show include links to survey scams and YouTube videos offering "expert tips" on the hours-old video game.

These various scams are being promoted through the web at large and social media websites, including Facebook and Pinterest.

More details of these scams can be found in a blog post by GFI Software here.

Chris Boyd, senior threat researcher at GFI Software, and an expert in gaming security, told El Reg that the scams coinciding with the release of Diablo 3 are similar to those that have accompanied a succession of major gaming releases over recent months.

"Major releases have been an excellent target of scammers for some time now, from Fake AV [anti-virus] to SEO poisonings. There have been a number of scams targeting those stuck on Red Dead Redemption's treasure map hunts in 2010 and malware links posted to Twitter aimed at fans of Portal 2 in 2011. The most recent example of scammers looking to profit comes from Mass Effect 3, where scammers utilised surveys that promised an alternative ending to the game."

More scams accompanying future high-profile video game releases are almost inevitable, Boyd warned.

"Diablo 3 is one of the most anticipated titles of the last few years and it's only natural that dubious downloads are now in circulation. Games are now a huge draw for anybody looking to turn a fast profit," he concluded. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?