Tuesday, December 3, 2024
Homecyber securityYoung Gamers Under Attack, Here is the List of Games Targeted

Young Gamers Under Attack, Here is the List of Games Targeted

Published on

SIEM as a Service

As the new school year begins, students are gearing up for new classes and friendships and diving back into the digital world of video games.

However, this virtual playground is not as safe as it seems. Cybercriminals are increasingly targeting young gamers, exploiting their enthusiasm for popular games.

This article explores the games most under attack, the nature of these threats, and how parents and young gamers can protect themselves.

- Advertisement - SIEM as a Service

The Most Targeted Games

According to a recent report by cybersecurity experts at Kaspersky, several popular games have become prime targets for cybercriminals.

The data from the global Kaspersky Security Network (KSN) highlights the games with the highest number of attack attempts from July 2023 to July 2024.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Here is a breakdown of the most targeted games:

Game NameNumber of Attack Attempts
Minecraft3,094,057
Roblox1,649,745
Among Us945,571
Brawl Stars309,554
Five Nights at Freddy’s219,033
Fortnite165,859
Angry Birds66,754
The Legend of Zelda33,774
Toca Life World28,360
Valorant28,119
Mario Kart14,682
Subway Surfers14,254
Overwatch 29,076
Animal Crossing8,262
Apex Legend8,133

Minecraft tops the list with over three million attack attempts, nearly double the number of attacks on Roblox in second place.

The high number of attacks on Minecraft is mainly due to the popularity of mods and cheats, which often disguise malicious software.

Common Threats and Scams

The types of threats targeting these games are varied, with downloaders, adware, Trojans, and backdoors being the most common.

Downloaders, in particular, pose a significant risk as they often masquerade as legitimate game enhancements but instead download harmful software.

Phishing scams are another prevalent threat. These scams often promise free in-game items like skins or currency, enticing young gamers to enter their account credentials on fraudulent websites.

For instance, a scam involving the game Valorant and popular YouTuber MrBeast lured players with promises of free skins, only to hijack their accounts.

MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website
MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website

The Lure of Freebies

Phishing schemes frequently exploit the allure of free in-game currency or items.

Many games operate with dual currency systems: soft currency, earned through gameplay, and hard currency, purchased with real money.

Scammers often promise free hard currency, leading players to phishing sites where they risk losing their gaming accounts and sensitive personal data.

Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)
Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)

A notable example involves Pokémon GO, where players are tricked into entering their credentials for free currency, only to be redirected to more dangerous scams targeting financial information.

Protecting Young Gamers

Parents and guardians must educate young gamers about the risks of downloading mods from untrusted sources and entering personal information on unfamiliar websites to safeguard young gamers.

Here are some actionable tips:

  1. Use Trusted Sources: Encourage downloading games and mods only from official platforms, such as app stores or the game’s official website.
  2. Educate on Phishing: Teach children to recognize phishing attempts and to be wary of offers that seem too good to be true.
  3. Install Security Software: Use reliable cybersecurity solutions that offer real-time protection against malware and phishing attacks.
  4. Monitor Online Activity: Keep an eye on the games and websites your children visit and discuss any unusual activity with them.

By staying informed and vigilant, parents and young gamers can enjoy the digital world safely, freeing the fun of gaming from the threats lurking online.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...