44 million stolen gaming credentials discovered

Share this article:
Symantec researchers have discovered a database server hosting the stolen credentials of 44 million accounts belonging to at least 18 gaming websites.

“What was interesting about this threat wasn't just the sheer number of stolen accounts, but that the accounts were being validated by a trojan [detected by Symantec as Trojan.Loginck] distributed to compromised computers,” Eoin Ward, anti-virus researcher and security response engineer at Symantec, wrote in a blog post Wednesday.

The malware was developed to log into the database and download a group of usernames and passwords to check them for validity. The trojan-based validation allows attackers to check the accounts more quickly than trying to manually log into the accounts.

If the trojan successfully logs into an account, it will update the database with the time it logged in and the current game level of the account.

Gaming account credentials can be valuable if the accounts are valid. This is because the assets that a player accumulates in the games, such as weapons and armor, are worth real-world dollars.

The market value of online gaming accounts can range from less than $10 to several thousand dollars, depending on how advanced an account is.

The database contains 16 million stolen account credentials for Wayi Entertainment, two million for Play NC, 210, 000 for World of Warcraft, and 60,000 for Aion. Symantec recommended that users of the affected sites change their passwords.

Share this article:

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.