Hackers Are Targeting Young Video Gamers

In the online gaming world, it’s normal to play and this is presenting an increasingly important security threat as the value of the industry grows and many players have come to accept bad behaviour and people who become friends who they don’t know from another country.

A new forecast report by Experian, the credit and identity theft protection firm, predicts that video-game data breaches will be a major issue in 2019. 

Cybercriminals can “easily pose as a gamer, build trust within a particular game or community, and gain access to privileged inside information,” the report said. 

This includes obtaining personal information like full names and phone numbers, as well as passwords and credit-card details. The report notes that hackers can also steal in-game tokens and weapons that can be worth a lot of money.

“We are not trying to imply all gamers are hackers, but they do live in an anonymous environment, have good computer skills, and are in an industry with billions in revenue,” Michael Bruemmer, vice president of data breach resolution at Experian, told MarketWatch.

While video-game hacks are nothing new, it is now much more lucrative because of the industry’s massive growth and shift towards selling in-game assets. According to Newzoo, a gaming analytics firm, the industry is worth about $138 billion worldwide. 

Juniper Research, a specialist in digital markets, also found that the skin-trading industry, in which where gamers buy and sell valuable in-game items, was worth $50 billion in 2017. The majority of Fortnite’s revenue, which was over $1 billion as of July this year, comes from selling in-game add ons.

Young gamers, Experian’s report notes, are particularly at risk, especially if they do not fully understand security practices or believe they are in a trusted community. And with the explosive growth of games like Fortnite, which has 80 million monthly players and is hugely popular with kids and teens, more minors are playing games and are vulnerable. 

Earlier this year, for instance, hackers manipulated children playing Fortnite to give up their parents’ bank account details through a phishing scam.

Data theft isn’t the only pressing concern. Experian’s report cites an incident from July in which a hacker infiltrated Roblox, a popular online game among kids, and made customised animations that gang-raped a 7-year-old girl’s avatar. 

“Female gamers have long been harassed and threatened,” Experian wrote, “a situation that will get worse as more people enter an unregulated gaming world.”

Kotaku has created a gamer’s guide that helps users defend against hackers. Some companies, like Xbox, have parental controls in place to monitor children’s gaming activities, and the US Federal Trade Commission has agreed to investigate whether children are being lured into gambling via video games. 

Until the industry is more regulated, however, the report notes, players can take added security measures like downloading a password manager or enabling two-step authentication.

Quartz:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« What's Your Digital Data Worth?
Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cybercrowd

Cybercrowd

Cybercrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.