Critical flaws when things get on-line
2019-07-01Criminals in the gaming vertical will often target users of popular games and work to find accounts that they can compromise. Once those attackers are armed with the necessary credentials, the compromised account can then be traded or sold, making the underground economy for credentials a lucrative spot.
Many gaming companies have warned players against password reuse across multiple websites and games. Password reuse is a primary reason why credential stuffing attacks are so successful. While good credential hygiene is the responsibility of the end user, businesses must work to bridge the knowledge gap in order to keep their customers and users safe.
Across all industries, the United States is still the top source for credential stuffing attacks. However, when you look into the gaming vertical specifically, the United States drops to third, behind Russia and Canada.
There are newer terminologies like BugDrop, which is a new form of malware that surreptitiously infects desktop and laptop computers and uses the PC's microphone to secretly record audio. The BugDrop malware then exports the audio data from infected computers to Dropbox files for retrieval and analysis by cyber criminals. Whereas, Ransomware is used to penetrate extortion against individuals and organizations. One needs to be aware to get secure. So it is advisable to not make every data on-line; it has to be kept off-line, you can store the data in a Hard disk, SSD or a NAS (Network accessed storage) that hasn’t connect to the internet.
The gaming hardware could have been effected by Botnet, which is a network of infected computers that communicate with each other in order to perform the same malicious actions, like launching spam campaigns or distributed denial-of-service attacks. The network can be controlled remotely by online criminals to serve their interests, and at the same time, this allows the hackers to avoid detection or legal actions by law agencies. There are several newer terminologies that are getting coined through the hackers, cyber experts/ advisors and professionals.
Through this process the malware establishes in the system/captures the computer that is called, the adware, any software package which automatically plays, displays or download advertisements to a computer. This can happen after the software has been installed or while the application is being used.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.