Feeds

15 MILLION dodgy login attempts spaffed all over Nintendo loyalists

Thousands of players plundered for their hard-earned booty

Top 5 reasons to deploy VMware with Tegile

Hackers broke into 24,000 Club Nintendo accounts after pummelling the loyalty-reward website in a month-long assault.

The games console titan revealed that the sustained brute-force attack exposed the names, addresses, phone numbers and other personal details of thousands of its customers.

Nintendo has reset a number of passwords as a first step towards resolving the problem. Hackers began probing Ninty's network on 9 June, but their volleys were only detected nearly a month later - on 2 July.

An investigation subsequently uncovered evidence of more than 23,926 unauthorised but successful logins. Nearly 15.5 million logins were attempted during the cyber-battering, The Japan Times reports.

Club Nintendo allows players to gain points by purchasing games or consoles. These points can be redeemed for goods such as CDs, and it is likely that this is what motivated the attack. The console maker is promising to beef up security in the wake of the assault, one among a growing list of security incidents involving video gaming firms.

A Nintendo representative told gaming news site Computer and Video Games that only users in the Wii maker's home turf of Japan were affected.

Last week games publisher Ubisoft announced that in had fallen victim to a hack attack, prompting a decision to force a reset of customers' uPlay passwords. Neither the Ubisoft nor the Nintendo breaches involved financial records.

Both were on a much smaller scale than the infamous PlayStation Network breach of April 2011, which led to the suspected compromise of 77 million accounts. PSN was taken offline for more than a month to sort out the resulting mess, the worst of its kind in history. ®

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.