Scammers create fake in-game store mimicking the PUBG mobile interface. The scheme encourages users to log in using their social media credentials<\/em><\/strong><\/p>\nUnsolicited mining: programs that ruin the gaming experience<\/h2>\n
Miners are programs that may adversely affect a computer’s productivity. Once a miner file is launched on an affected computer, it starts using the machine’s energy to mine cryptocurrency. When it comes to unsolicited miners that interfere with users’ operating systems against their will, the situation might get even worse \u2013 especially for gamers who value the computer’s productivity above all.<\/p>\n
According to our analysis, Far Cry, a gaming series that spans 18 years and six editions, proved to be the most popular title among unsolicited miners \u2013 both in terms of affected users (1,050) and unique malicious files (510). Other games that make the perfect bait for miners include Minecraft with 406 unique files and Valorant with 93 files. Overall, from July 1st<\/sup> 2021 through June 30th<\/sup> 2022, we managed to detect 1,367 unique mining files which affected 3,374 users. That said, the number of users affected by miners halved in H1 2022 (1002) compared to H1 2021 (2086), which may be linked to the sharp drop in the bitcoin exchange rate. Interestingly, the number of unique miner files rose by 30% in H1 2022 (497) compared to H1 2021 (383).<\/p>\nUnder the guise of one of the biggest novelties of 2022, cybercriminals have also distributed malware related to miners. The fantasy role-playing game Elden Ring was used as a lure by cybercriminals who spread OpenSUpdater. OpenSUpdater is a Trojan that pretends to be a cracked version of a game, and, once installed, downloads and installs various unwanted programs and miners to the victim’s device.<\/p>\n
The OpenSUpdater campaign only targets users from certain countries, so if the user’s IP address does not satisfy the regional requirements of the distribution server, clean software will be downloaded, e.g., the 7zip archive manager. Less fortunate users will receive an installer that delivers various payloads, including legitimate software, potentially unwanted applications, and miners. Infection chain consists of two stages. At the first stage, a malicious downloader is installed. The code of this downloader is updated by threat actors several times a week by using various obfuscation and anti-emulation techniques. The main purpose of these changes is to complicate threat investigation and detection. The second stage is the installer itself.<\/p>\n
Cheating in games, or being cheated?<\/h2>\n
Every gamer aims for the best performance and results \u2013 even when they are not competing for a precious trophy. This explains why cheating will never go out of style. However, some of the cheats can bring more harm than good.<\/p>\n
What exactly are cheats? When we talk about cheats, we refer to the programs that help gamers create an advantage beyond the available capabilities by applying special cheat codes or installing software that allows sideways. Cybercriminals try to fool gamers by creating fake cheat programs which, instead of providing advantages, negatively affect computers’ performance or even steal player’s data.<\/p>\n
From July 1st<\/sup> 2021 through June 30th<\/sup> 2022, we detected 3,154 unique files distributed as cheat programs for the most popular game titles, with a total of 13,689 users affected. The vast majority of the files mimicking cheat programs were related to Counter Strike: Global Offense (418), Roblox and Valorant (332 files for both), and Total War (284). At the same time, Need for Speed came first by number of unique users exposed to this type of threats (3,256) \u2013 this series of games has not lost in its broad popularity after several decades and generations.<\/p>\nConclusion and Recommendations<\/h2>\n
The pandemic times greatly boosted the gaming industry, increasing the number of computer game fans several times over.<\/p>\n
Despite the fact that the number of users affected by gaming-related threats has dropped, certain gaming threats are still on the rise. Over the past year, we have seen an increase in cybercriminal activity around stealers, which allow attackers to steal bank card data, credentials, and even crypto wallets data from infected devices. In the first half of 2022, we observed a noticeable increase in the number of users attacked by stealers, with a 13 percent increase over the first half of 2021.<\/p>\n
We also analyzed which popular games were used as a lure by cybercriminals who distributed malware and unwanted software, and found that most often these were multiplayer gaming platforms, such as Minecraft and Roblox. Worryingly, the primary target audience for these games is children and teenagers, who have much less knowledge of cybersecurity due to a lack of experience. Because of this, we assume that they could become an easy prey for cybercriminals, which means we need to pay special attention to cybersecurity hygiene training for kids.<\/p>\n
Traditionally, we have found a lot of different examples of phishing tools spread by cybercriminals to get access to gaming accounts, in-game items or money. Cybercriminals mostly created phishing pages that mimicked the appearance of the games whose users they were targeting. For example, we observed fake in-game stores for PUBG and CS:GO.<\/p>\n
Over the years, the gaming industry has grown more and more, and we expect to see new ways of abusing users next year, e.g. by exploiting the theme of esports, which are now gaining popularity around the world. That is why it is so important to stay protected, so you do not lose your money, credentials, or gaming account, which you have built over the years.<\/p>\n
Here is what we recommend to stay safe while gaming.<\/p>\n
\n- Protect your accounts with two-factor authentication whenever possible. At least comb through account settings if you cannot.<\/li>\n
- Use a unique, strong password for each of your accounts. Should one of your passwords get leaked, the rest of your accounts would remain safe.<\/li>\n
- You will benefit greatly from a robust security solution that will protect you from every possible cyberthreat without interfering with your computer’s performance while you are playing. \u202fKaspersky Total Security<\/a> plays nicely with Steam and other gaming services.<\/li>\n
- Download your games from official stores like Steam, Apple App Store, Google Play, or Amazon Appstore only. While not 100 % safe, games from these stores undergo a screening process, which makes sure that a random app cannot be published.<\/li>\n
- If your desired title is not available from the official store, purchase it from the official website only. Double-check the URL of the website to make sure it is authentic.<\/li>\n
- Avoid buying the first thing that pops up. Even during Steam’s summer sale, make sure you read a few reviews before forking out the dough for a little-known title. If something is fishy, other people will have figured it out.<\/li>\n
- Beware of phishing campaigns and unfamiliar gamers. Do not open links received by email or in a game chat unless you trust the sender. Do not open files from strangers.<\/li>\n
- Carefully check the address of any website asking for your username and password, as it might be\u202ffake.<\/li>\n
- Avoid downloading cracked software or any other illegal content, even if you are redirected to it from a legitimate website.<\/li>\n
- Keep your operating system and other software up to date. Updates can help address many security issues.<\/li>\n
- Do not visit dubious websites when these are offered in search results and do not install anything they offer.<\/li>\n
- Use a robust security solution to protect yourself from malicious software on mobile devices, such as Kaspersky Internet Security for Android<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"
In this report, we analyze malware, potentially unwanted applications and phishing cases related to most popular video games and cheats for these games.<\/p>\n","protected":false},"author":386,"featured_media":103059,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[159],"tags":[472,561,189,123,86,933,76,163,723,1052,1019],"banners":"","hreflang":[{"hreflang":"x-default","url":"https:\/\/securelist.com\/gaming-related-cyberthreats-2021-2022\/107346\/"}],"_links":{"self":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/107346"}],"collection":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/users\/386"}],"replies":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/comments?post=107346"}],"version-history":[{"count":17,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/107346\/revisions"}],"predecessor-version":[{"id":108045,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/107346\/revisions\/108045"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media\/103059"}],"wp:attachment":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media?parent=107346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/categories?post=107346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/tags?post=107346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}