Friday, April 11, 2025
Homecyber securityYoung Gamers Under Attack, Here is the List of Games Targeted

Young Gamers Under Attack, Here is the List of Games Targeted

Published on

SIEM as a Service

Follow Us on Google News

As the new school year begins, students are gearing up for new classes and friendships and diving back into the digital world of video games.

However, this virtual playground is not as safe as it seems. Cybercriminals are increasingly targeting young gamers, exploiting their enthusiasm for popular games.

This article explores the games most under attack, the nature of these threats, and how parents and young gamers can protect themselves.

- Advertisement - Google News

The Most Targeted Games

According to a recent report by cybersecurity experts at Kaspersky, several popular games have become prime targets for cybercriminals.

The data from the global Kaspersky Security Network (KSN) highlights the games with the highest number of attack attempts from July 2023 to July 2024.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Here is a breakdown of the most targeted games:

Game NameNumber of Attack Attempts
Minecraft3,094,057
Roblox1,649,745
Among Us945,571
Brawl Stars309,554
Five Nights at Freddy’s219,033
Fortnite165,859
Angry Birds66,754
The Legend of Zelda33,774
Toca Life World28,360
Valorant28,119
Mario Kart14,682
Subway Surfers14,254
Overwatch 29,076
Animal Crossing8,262
Apex Legend8,133

Minecraft tops the list with over three million attack attempts, nearly double the number of attacks on Roblox in second place.

The high number of attacks on Minecraft is mainly due to the popularity of mods and cheats, which often disguise malicious software.

Common Threats and Scams

The types of threats targeting these games are varied, with downloaders, adware, Trojans, and backdoors being the most common.

Downloaders, in particular, pose a significant risk as they often masquerade as legitimate game enhancements but instead download harmful software.

Phishing scams are another prevalent threat. These scams often promise free in-game items like skins or currency, enticing young gamers to enter their account credentials on fraudulent websites.

For instance, a scam involving the game Valorant and popular YouTuber MrBeast lured players with promises of free skins, only to hijack their accounts.

MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website
MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website

The Lure of Freebies

Phishing schemes frequently exploit the allure of free in-game currency or items.

Many games operate with dual currency systems: soft currency, earned through gameplay, and hard currency, purchased with real money.

Scammers often promise free hard currency, leading players to phishing sites where they risk losing their gaming accounts and sensitive personal data.

Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)
Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)

A notable example involves Pokémon GO, where players are tricked into entering their credentials for free currency, only to be redirected to more dangerous scams targeting financial information.

Protecting Young Gamers

Parents and guardians must educate young gamers about the risks of downloading mods from untrusted sources and entering personal information on unfamiliar websites to safeguard young gamers.

Here are some actionable tips:

  1. Use Trusted Sources: Encourage downloading games and mods only from official platforms, such as app stores or the game’s official website.
  2. Educate on Phishing: Teach children to recognize phishing attempts and to be wary of offers that seem too good to be true.
  3. Install Security Software: Use reliable cybersecurity solutions that offer real-time protection against malware and phishing attacks.
  4. Monitor Online Activity: Keep an eye on the games and websites your children visit and discuss any unusual activity with them.

By staying informed and vigilant, parents and young gamers can enjoy the digital world safely, freeing the fun of gaming from the threats lurking online.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...