Video Gamers Are In The Target Area

The online gaming industry is much bigger than you might think, with an estimated value of $200 billion in 2020 and with lockdown restrictions in place in many countries, a lot more on-line gaming is taking place.

The growing success of this industry and the multitude of users also draws the  attention to cyber criminals looking for new targets and it turns out the gaming industry has not been prioritising its cyber security.  Cyber security researchers analysts have discovered that half a million gaming companies employees’ information have been breached, along with a million compromised internal accounts on the Dark Web.

The leading video game-maker Capcom (Resident Evil, Street Fighter, and Mega Man) announced  its computer systems were hacked at the end of 2020 , in just the  the latest known cyber attack to hit the games industry.  It said some of its internal networks had been suspended "due to unauthorised access" from outside Capcom. But it said "at present", there was no sign that customer information had been accessed.

The security intelligence firm KELA has inspected  the top  25 publicly listed companies in the gaming sector, delving in to Dark Web marketplaces, and has found a thriving black market including nearly one million compromised accounts related to employee- and customer-facing resources, 50% which were listed for sale in 2020. 

Compromised accounts were found for nearly all of the top 25 gaming companies studied. This could put these firms at risk of customer data theft, corporate espionage, ransomware and more.

KELA said it had tracked ransomware attacks on four gaming companies in recent months. Elsewhere, the researchers found half-a-million gaming employee credentials exposed on the dark web after breaches at third-party firms, many of which were available for free. These could also provide attackers with a useful foothold in victim networks, they warned. KELA has urged gaming companies to invest in ongoing monitoring of their digital assets across the dark web, as well as enhanced staff training on things like password management, and deployment of multi-factor authentication (MFA).

According to the Cloud delivery network provider Akamai Technologies, the gaming community is among the most lucrative targets for hackers to make a quick profit. In its research report, “2019 State of the Internet/Security Web Attacks and Gaming Abuse” Akamai stated that there were 55 billion cases across all industries.

The report highlighted that nearly 67% of credential stuffing attacks target organizations based in the United States. It stated that Russia is the second largest source of application attacks and China is ranked as the fourth highest source country. 
On the other hand, the United Kingdom ranked as the second highest targeted country with Japan, Canada, Australia, and Italy are all also among the countries most targeted.

When considering hacking and other cyber security problems, the gaming industry is frequently ignored, but the evidence shows that the gaming industry is highly vulnerable to security concerns and many customers are completely unaware of how much danger their personal information might be in.

KELA:        BBC:      Infosecurity:        CISO Mag:       TecEze

You Might Also Read:

Businesses Need To Protect Data, Not Just Devices:

 

« WhatsApp Updates Its 'Privacy' Rules
British Police Launch CyberAlarm »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Celare

Celare

Celare delivers DPI based network perimeter monitoring solutions with integrated Big Data security analytics and threat detection.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Redpoint Cybersecurity

Redpoint Cybersecurity

Redpoint Cybersecurity is a human-led, technology-enabled managed cybersecurity provider specializing in Digital Forensics, Incident Response and proactive cyberattack prevention.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

REAL Security

REAL Security

REAL Security is a market leader across the Adriatic region in value-added distribution in the field of IT Security & virtualisation.