Saturday, April 5, 2025
Homecyber securityYoung Gamers Under Attack, Here is the List of Games Targeted

Young Gamers Under Attack, Here is the List of Games Targeted

Published on

SIEM as a Service

Follow Us on Google News

As the new school year begins, students are gearing up for new classes and friendships and diving back into the digital world of video games.

However, this virtual playground is not as safe as it seems. Cybercriminals are increasingly targeting young gamers, exploiting their enthusiasm for popular games.

This article explores the games most under attack, the nature of these threats, and how parents and young gamers can protect themselves.

The Most Targeted Games

According to a recent report by cybersecurity experts at Kaspersky, several popular games have become prime targets for cybercriminals.

The data from the global Kaspersky Security Network (KSN) highlights the games with the highest number of attack attempts from July 2023 to July 2024.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Here is a breakdown of the most targeted games:

Game NameNumber of Attack Attempts
Minecraft3,094,057
Roblox1,649,745
Among Us945,571
Brawl Stars309,554
Five Nights at Freddy’s219,033
Fortnite165,859
Angry Birds66,754
The Legend of Zelda33,774
Toca Life World28,360
Valorant28,119
Mario Kart14,682
Subway Surfers14,254
Overwatch 29,076
Animal Crossing8,262
Apex Legend8,133

Minecraft tops the list with over three million attack attempts, nearly double the number of attacks on Roblox in second place.

The high number of attacks on Minecraft is mainly due to the popularity of mods and cheats, which often disguise malicious software.

Common Threats and Scams

The types of threats targeting these games are varied, with downloaders, adware, Trojans, and backdoors being the most common.

Downloaders, in particular, pose a significant risk as they often masquerade as legitimate game enhancements but instead download harmful software.

Phishing scams are another prevalent threat. These scams often promise free in-game items like skins or currency, enticing young gamers to enter their account credentials on fraudulent websites.

For instance, a scam involving the game Valorant and popular YouTuber MrBeast lured players with promises of free skins, only to hijack their accounts.

MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website
MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website

The Lure of Freebies

Phishing schemes frequently exploit the allure of free in-game currency or items.

Many games operate with dual currency systems: soft currency, earned through gameplay, and hard currency, purchased with real money.

Scammers often promise free hard currency, leading players to phishing sites where they risk losing their gaming accounts and sensitive personal data.

Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)
Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)

A notable example involves Pokémon GO, where players are tricked into entering their credentials for free currency, only to be redirected to more dangerous scams targeting financial information.

Protecting Young Gamers

Parents and guardians must educate young gamers about the risks of downloading mods from untrusted sources and entering personal information on unfamiliar websites to safeguard young gamers.

Here are some actionable tips:

  1. Use Trusted Sources: Encourage downloading games and mods only from official platforms, such as app stores or the game’s official website.
  2. Educate on Phishing: Teach children to recognize phishing attempts and to be wary of offers that seem too good to be true.
  3. Install Security Software: Use reliable cybersecurity solutions that offer real-time protection against malware and phishing attacks.
  4. Monitor Online Activity: Keep an eye on the games and websites your children visit and discuss any unusual activity with them.

By staying informed and vigilant, parents and young gamers can enjoy the digital world safely, freeing the fun of gaming from the threats lurking online.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...