Hackers Are Targeting Young Video Gamers

In the online gaming world, it’s normal to play and this is presenting an increasingly important security threat as the value of the industry grows and many players have come to accept bad behaviour and people who become friends who they don’t know from another country.

A new forecast report by Experian, the credit and identity theft protection firm, predicts that video-game data breaches will be a major issue in 2019. 

Cybercriminals can “easily pose as a gamer, build trust within a particular game or community, and gain access to privileged inside information,” the report said. 

This includes obtaining personal information like full names and phone numbers, as well as passwords and credit-card details. The report notes that hackers can also steal in-game tokens and weapons that can be worth a lot of money.

“We are not trying to imply all gamers are hackers, but they do live in an anonymous environment, have good computer skills, and are in an industry with billions in revenue,” Michael Bruemmer, vice president of data breach resolution at Experian, told MarketWatch.

While video-game hacks are nothing new, it is now much more lucrative because of the industry’s massive growth and shift towards selling in-game assets. According to Newzoo, a gaming analytics firm, the industry is worth about $138 billion worldwide. 

Juniper Research, a specialist in digital markets, also found that the skin-trading industry, in which where gamers buy and sell valuable in-game items, was worth $50 billion in 2017. The majority of Fortnite’s revenue, which was over $1 billion as of July this year, comes from selling in-game add ons.

Young gamers, Experian’s report notes, are particularly at risk, especially if they do not fully understand security practices or believe they are in a trusted community. And with the explosive growth of games like Fortnite, which has 80 million monthly players and is hugely popular with kids and teens, more minors are playing games and are vulnerable. 

Earlier this year, for instance, hackers manipulated children playing Fortnite to give up their parents’ bank account details through a phishing scam.

Data theft isn’t the only pressing concern. Experian’s report cites an incident from July in which a hacker infiltrated Roblox, a popular online game among kids, and made customised animations that gang-raped a 7-year-old girl’s avatar. 

“Female gamers have long been harassed and threatened,” Experian wrote, “a situation that will get worse as more people enter an unregulated gaming world.”

Kotaku has created a gamer’s guide that helps users defend against hackers. Some companies, like Xbox, have parental controls in place to monitor children’s gaming activities, and the US Federal Trade Commission has agreed to investigate whether children are being lured into gambling via video games. 

Until the industry is more regulated, however, the report notes, players can take added security measures like downloading a password manager or enabling two-step authentication.

Quartz:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« What's Your Digital Data Worth?
Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp Fintech & Cybersecurity

Startupbootcamp is the world’s largest network of multi-corporate backed accelerators helping startups scale internationally.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

RedNode

RedNode

RedNode is a cybersecurity service provider that offers customized security testing solutions to protect any size of business worldwide.