Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go

Thirty Five Gaming Firms Attacked over 4 Years Long Period

Kaspersky Lab the Russian security company reports that a maximum of 35 gaming entities fell to hackers' attack, with the miscreants understandably being Chinese-speaking, since 4-yrs gone by.

Actually Kaspersky issued one study lately elaborating that a certain malicious program known as Winnti aimed attack at the gaming entities as it endorsed itself utilizing deceptively-seized digital certificates so it could penetrate computers without notice.

The company also elaborated that the hackers' chief purpose was for filching source codes related to Internet games and also authentic software firms' digital certificates. Furthermore, the gang wanted to find out the setting of the network structures pertaining to the gaming projects, including their servers, as well as how fresh developments occurred in their design, idea and other concepts, Kaspersky stated. Venturebeat.com published this dated April 11, 2013.

Meanwhile, the first time researchers from Kaspersky encountered the malevolent operations of Winnti was during 2011 autumn. At that time, one Trojan virus happened to get spotted on numerous users' PCs, globally. The infection was reportedly associated with victims being big admirers of one widely played Internet game.

Just following that, it became known of the malicious program that it proliferated through one routine update served via an authorized server of the gaming entity.

And once the matter reconciled, experts after sometime discovered that it was a mere accident that the malware got planted onto the players' PCs, while the cyber-crooks in fact tried to aim at the gaming firm. At this juncture, researchers from Kaspersky Lab were requested that they investigate the problem.

Consequently, it turned out that the Trojan was one Digital Link Library file created to target 64-bit Windows systems as also digitally signed. The Trojan that enabled the cyber-criminals with remote backdoor access as well as manipulation of the contaminated systems happened to be an unprecedented malware.

Eventually, besides filching digital certificates, those behind Winnti wanted to manipulate 'gold' and 'runes' too the currency circulated during the game which could be exchanged for actual currency, whilst the theft of source codes was related with helping in deploying those codes within servers distributing the games' counterfeit editions.

Related article: Third Active Attack Weighs Down On Microsoft Word

» SPAMfighter News - 17-04-2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next