Hackers Are Targeting Young Video Gamers

In the online gaming world, it’s normal to play and this is presenting an increasingly important security threat as the value of the industry grows and many players have come to accept bad behaviour and people who become friends who they don’t know from another country.

A new forecast report by Experian, the credit and identity theft protection firm, predicts that video-game data breaches will be a major issue in 2019. 

Cybercriminals can “easily pose as a gamer, build trust within a particular game or community, and gain access to privileged inside information,” the report said. 

This includes obtaining personal information like full names and phone numbers, as well as passwords and credit-card details. The report notes that hackers can also steal in-game tokens and weapons that can be worth a lot of money.

“We are not trying to imply all gamers are hackers, but they do live in an anonymous environment, have good computer skills, and are in an industry with billions in revenue,” Michael Bruemmer, vice president of data breach resolution at Experian, told MarketWatch.

While video-game hacks are nothing new, it is now much more lucrative because of the industry’s massive growth and shift towards selling in-game assets. According to Newzoo, a gaming analytics firm, the industry is worth about $138 billion worldwide. 

Juniper Research, a specialist in digital markets, also found that the skin-trading industry, in which where gamers buy and sell valuable in-game items, was worth $50 billion in 2017. The majority of Fortnite’s revenue, which was over $1 billion as of July this year, comes from selling in-game add ons.

Young gamers, Experian’s report notes, are particularly at risk, especially if they do not fully understand security practices or believe they are in a trusted community. And with the explosive growth of games like Fortnite, which has 80 million monthly players and is hugely popular with kids and teens, more minors are playing games and are vulnerable. 

Earlier this year, for instance, hackers manipulated children playing Fortnite to give up their parents’ bank account details through a phishing scam.

Data theft isn’t the only pressing concern. Experian’s report cites an incident from July in which a hacker infiltrated Roblox, a popular online game among kids, and made customised animations that gang-raped a 7-year-old girl’s avatar. 

“Female gamers have long been harassed and threatened,” Experian wrote, “a situation that will get worse as more people enter an unregulated gaming world.”

Kotaku has created a gamer’s guide that helps users defend against hackers. Some companies, like Xbox, have parental controls in place to monitor children’s gaming activities, and the US Federal Trade Commission has agreed to investigate whether children are being lured into gambling via video games. 

Until the industry is more regulated, however, the report notes, players can take added security measures like downloading a password manager or enabling two-step authentication.

Quartz:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« What's Your Digital Data Worth?
Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.