Cyber Security News

Young Gamers Under Attack, Here is the List of Games Targeted

As the new school year begins, students are gearing up for new classes and friendships and diving back into the digital world of video games.

However, this virtual playground is not as safe as it seems. Cybercriminals are increasingly targeting young gamers, exploiting their enthusiasm for popular games.

This article explores the games most under attack, the nature of these threats, and how parents and young gamers can protect themselves.

The Most Targeted Games

According to a recent report by cybersecurity experts at Kaspersky, several popular games have become prime targets for cybercriminals.

The data from the global Kaspersky Security Network (KSN) highlights the games with the highest number of attack attempts from July 2023 to July 2024.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Here is a breakdown of the most targeted games:

Game NameNumber of Attack Attempts
Minecraft3,094,057
Roblox1,649,745
Among Us945,571
Brawl Stars309,554
Five Nights at Freddy’s219,033
Fortnite165,859
Angry Birds66,754
The Legend of Zelda33,774
Toca Life World28,360
Valorant28,119
Mario Kart14,682
Subway Surfers14,254
Overwatch 29,076
Animal Crossing8,262
Apex Legend8,133

Minecraft tops the list with over three million attack attempts, nearly double the number of attacks on Roblox in second place.

The high number of attacks on Minecraft is mainly due to the popularity of mods and cheats, which often disguise malicious software.

Common Threats and Scams

The types of threats targeting these games are varied, with downloaders, adware, Trojans, and backdoors being the most common.

Downloaders, in particular, pose a significant risk as they often masquerade as legitimate game enhancements but instead download harmful software.

Phishing scams are another prevalent threat. These scams often promise free in-game items like skins or currency, enticing young gamers to enter their account credentials on fraudulent websites.

For instance, a scam involving the game Valorant and popular YouTuber MrBeast lured players with promises of free skins, only to hijack their accounts.

MrBeast and the makers of Valorant probably have no idea about their skin giveaway collaboration on a scam website

The Lure of Freebies

Phishing schemes frequently exploit the allure of free in-game currency or items.

Many games operate with dual currency systems: soft currency, earned through gameplay, and hard currency, purchased with real money.

Scammers often promise free hard currency, leading players to phishing sites where they risk losing their gaming accounts and sensitive personal data.

Catchy phishing site targeting young Pokémon GO players (source: Kaspersky)

A notable example involves Pokémon GO, where players are tricked into entering their credentials for free currency, only to be redirected to more dangerous scams targeting financial information.

Protecting Young Gamers

Parents and guardians must educate young gamers about the risks of downloading mods from untrusted sources and entering personal information on unfamiliar websites to safeguard young gamers.

Here are some actionable tips:

  1. Use Trusted Sources: Encourage downloading games and mods only from official platforms, such as app stores or the game’s official website.
  2. Educate on Phishing: Teach children to recognize phishing attempts and to be wary of offers that seem too good to be true.
  3. Install Security Software: Use reliable cybersecurity solutions that offer real-time protection against malware and phishing attacks.
  4. Monitor Online Activity: Keep an eye on the games and websites your children visit and discuss any unusual activity with them.

By staying informed and vigilant, parents and young gamers can enjoy the digital world safely, freeing the fun of gaming from the threats lurking online.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

How to Conduct a Cloud Security Assessment

As organizations accelerate their adoption of cloud technologies, the need for robust cloud security has…

2 minutes ago

Cybercriminals Exploit Search Results to Steal Credit Card Information

Everyday internet searches, a routine activity for billions, harbor a hidden risk: cybercriminals are increasingly…

3 minutes ago

Jailbreaking Malicious JScript Loader Reveals Xworm Payload Execution Chain

Cybersecurity researchers have uncovered a sophisticated JScript-to-PowerShell loader delivering XWorm RAT and Rhadamanthys Stealer through a geofenced, multi-stage execution…

8 minutes ago

Paragon Hard Disk Manager Flaw Enables Privilege Escalation and DoS Attacks

Paragon Software’s widely used Hard Disk Manager (HDM) product line has been found to contain five severe…

53 minutes ago

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its Hertz,…

1 hour ago

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their reign…

3 hours ago