44 million stolen gaming credentials discovered

Share this article:
Symantec researchers have discovered a database server hosting the stolen credentials of 44 million accounts belonging to at least 18 gaming websites.

“What was interesting about this threat wasn't just the sheer number of stolen accounts, but that the accounts were being validated by a trojan [detected by Symantec as Trojan.Loginck] distributed to compromised computers,” Eoin Ward, anti-virus researcher and security response engineer at Symantec, wrote in a blog post Wednesday.

The malware was developed to log into the database and download a group of usernames and passwords to check them for validity. The trojan-based validation allows attackers to check the accounts more quickly than trying to manually log into the accounts.

If the trojan successfully logs into an account, it will update the database with the time it logged in and the current game level of the account.

Gaming account credentials can be valuable if the accounts are valid. This is because the assets that a player accumulates in the games, such as weapons and armor, are worth real-world dollars.

The market value of online gaming accounts can range from less than $10 to several thousand dollars, depending on how advanced an account is.

The database contains 16 million stolen account credentials for Wayi Entertainment, two million for Play NC, 210, 000 for World of Warcraft, and 60,000 for Aion. Symantec recommended that users of the affected sites change their passwords.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.