Friday, July 19, 2024

Activision Players Attacked by Password Stealing Malware: Investigation In Progress

Activision, the powerhouse behind popular titles such as Call of Duty, is currently embroiled in an investigation into a hacking campaign aimed at its players.

The primary objective of cybercriminals is to siphon off player credentials, focusing on gaming accounts and cryptocurrency wallets.

Sources close to the situation, who have requested anonymity due to the matter’s sensitivity, have revealed that the hackers are infiltrating victims’ computers with malware. The malicious software then proceeds to extract passwords for various accounts.

The extent of the damage and the precise method of the malware’s distribution remains in mystery.

Speculation suggests that the issue may be confined to users who have installed third-party tools on their systems.

Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Activision Blizzard’s internal team is reportedly hard at work, attempting to eradicate the malware and restore security to any player accounts that have been compromised.

Despite the urgency of the situation, Activision spokesperson Delaney Simmons has emphasized that the company’s servers are secure and have not been breached.

Instead, the spotlight is on unauthorized third-party software as the likely culprit behind the malware infections.

The Discovery and Response

The malware campaign’s initial discovery is credited to an individual known as Zebleer, who is involved in the development and sale of cheating software for Call of Duty.

Zebleer stumbled upon the issue when a customer reported the theft of their account for the cheat software.

This prompted an investigation that led to unearthing a database filled with stolen credentials.

Zebleer has since taken proactive measures, alerting Activision Blizzard and other cheat providers whose users might be at risk.

TechCrunch has independently verified a sample of the stolen logins, confirming the authenticity of at least a portion of the data.

However, the freshness of the data remains uncertain.

The Impact on Players

At this juncture, there is no evidence that the average Activision game player is in danger.

The threat specifically targets individuals who utilize third-party applications, including cheats.

Nevertheless, Activision’s Simmons has advised all users who feel their accounts may have been compromised to change their passwords and enable two-factor authentication as a precautionary measure.

As the investigation continues, the gaming community is on high alert.

The incident is a stark reminder of the risks of downloading and using unauthorized software.

It also underscores the importance of cybersecurity measures such as two-factor authentication in safeguarding digital identities.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles