Video Gamers Are In The Target Area

The online gaming industry is much bigger than you might think, with an estimated value of $200 billion in 2020 and with lockdown restrictions in place in many countries, a lot more on-line gaming is taking place.

The growing success of this industry and the multitude of users also draws the  attention to cyber criminals looking for new targets and it turns out the gaming industry has not been prioritising its cyber security.  Cyber security researchers analysts have discovered that half a million gaming companies employees’ information have been breached, along with a million compromised internal accounts on the Dark Web.

The leading video game-maker Capcom (Resident Evil, Street Fighter, and Mega Man) announced  its computer systems were hacked at the end of 2020 , in just the  the latest known cyber attack to hit the games industry.  It said some of its internal networks had been suspended "due to unauthorised access" from outside Capcom. But it said "at present", there was no sign that customer information had been accessed.

The security intelligence firm KELA has inspected  the top  25 publicly listed companies in the gaming sector, delving in to Dark Web marketplaces, and has found a thriving black market including nearly one million compromised accounts related to employee- and customer-facing resources, 50% which were listed for sale in 2020. 

Compromised accounts were found for nearly all of the top 25 gaming companies studied. This could put these firms at risk of customer data theft, corporate espionage, ransomware and more.

KELA said it had tracked ransomware attacks on four gaming companies in recent months. Elsewhere, the researchers found half-a-million gaming employee credentials exposed on the dark web after breaches at third-party firms, many of which were available for free. These could also provide attackers with a useful foothold in victim networks, they warned. KELA has urged gaming companies to invest in ongoing monitoring of their digital assets across the dark web, as well as enhanced staff training on things like password management, and deployment of multi-factor authentication (MFA).

According to the Cloud delivery network provider Akamai Technologies, the gaming community is among the most lucrative targets for hackers to make a quick profit. In its research report, “2019 State of the Internet/Security Web Attacks and Gaming Abuse” Akamai stated that there were 55 billion cases across all industries.

The report highlighted that nearly 67% of credential stuffing attacks target organizations based in the United States. It stated that Russia is the second largest source of application attacks and China is ranked as the fourth highest source country. 
On the other hand, the United Kingdom ranked as the second highest targeted country with Japan, Canada, Australia, and Italy are all also among the countries most targeted.

When considering hacking and other cyber security problems, the gaming industry is frequently ignored, but the evidence shows that the gaming industry is highly vulnerable to security concerns and many customers are completely unaware of how much danger their personal information might be in.

KELA:        BBC:      Infosecurity:        CISO Mag:       TecEze

You Might Also Read:

Businesses Need To Protect Data, Not Just Devices:

 

« WhatsApp Updates Its 'Privacy' Rules
British Police Launch CyberAlarm »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.