{"id":792,"date":"2009-02-06T21:36:15","date_gmt":"2009-02-07T05:36:15","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/?p=792"},"modified":"2009-02-06T21:36:15","modified_gmt":"2009-02-07T05:36:15","slug":"current-event-spike-in-online-game-hacking","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/current-event-spike-in-online-game-hacking\/","title":{"rendered":"Current Event: Spike in Online Game hacking"},"content":{"rendered":"<p>According to an article on <a href=\"http:\/\/www.gamasutra.com\/php-bin\/news_index.php?story=22157\">Gamasutra<\/a> online game hacking spiked in 2008.\u00a0 It was noted that it usually wasn&#8217;t the games themselves being directly attacked, rather attackers would use social engineering or other techniques to install malware, such as keyloggers, that would steal the user&#8217;s account information.\u00a0 Once the attacker can log into the the victim&#8217;s account, they can then use their position of trust to send malicious links to friends of the victim, furthering their malicious goals.\u00a0 The attacker could also steal the victim&#8217;s virtual assets and sell them for real money.\u00a0 For example, in Blizzard&#8217;s World of Warcraft, despite it being against the EULA, there is a large real world market for in game gold and items.\u00a0 Because it is generally not the games themselves being attacked, it is hard for game developers to prevent this.\u00a0 However, Blizzard is setting a good example by allowing users to purchase RSA key generators as an extra line of defense (though you would think that with all the money they are sucking from their players they would be able to include this at no extra cost).\u00a0 These authenticators generate unique keys at the press of a button, a new one of which is required at each logon.\u00a0 With this extra layer of defense, even if the attacker logs the victim&#8217;s password and authenticator key, the next time they log on the authenticator key will be different, preventing the attacker from successfully logging on.\u00a0 More details on the Blizzard Authenticator can be found at Blizzard&#8217;s site <a href=\"http:\/\/us.blizzard.com\/support\/article.xml?articleId=24660&amp;rhtml=true\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to an article on Gamasutra online game hacking spiked in 2008.\u00a0 It was noted that it usually wasn&#8217;t the games themselves being directly attacked, rather attackers would use social engineering or other techniques to install malware, such as keyloggers, &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/06\/current-event-spike-in-online-game-hacking\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":109,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-792","post","type-post","status-publish","format-standard","hentry","category-current-events","category-miscellaneous"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/792","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/109"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=792"}],"version-history":[{"count":2,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/792\/revisions"}],"predecessor-version":[{"id":797,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/792\/revisions\/797"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}