What is it?
This threat refers to a plethora of password-stealing trojans targeting gamers. Virtual characters, weapons, treasures and cash have real monetary value and so the criminals are out to steal these items. Some of the trojan programs include sophisticated rootkit capabilities. Typically, the information stolen is sent to a remote attacker who then commandeers the account.
How does it work?
There are a variety of ways that these trojans get installed. A favorite method of the thieves is to implant the trojan in alleged cheats. Oftentimes the trojan is encountered in illegal software, not surprisingly file-sharing programs carry this and many other threats. These trojans can also be downloaded by bots on infected computers.
How can I prevent it?
The use of quality security software, meticulous patching and good judgment in what you install and where you visit on the web is the combination of defenses required to avoid this threat.
– Randy Abrams, director of technical education, ESET
From the - June 2010 Issue of SCMagazine »