Hackers Are Targeting Young Video Gamers

In the online gaming world, it’s normal to play and this is presenting an increasingly important security threat as the value of the industry grows and many players have come to accept bad behaviour and people who become friends who they don’t know from another country.

A new forecast report by Experian, the credit and identity theft protection firm, predicts that video-game data breaches will be a major issue in 2019. 

Cybercriminals can “easily pose as a gamer, build trust within a particular game or community, and gain access to privileged inside information,” the report said. 

This includes obtaining personal information like full names and phone numbers, as well as passwords and credit-card details. The report notes that hackers can also steal in-game tokens and weapons that can be worth a lot of money.

“We are not trying to imply all gamers are hackers, but they do live in an anonymous environment, have good computer skills, and are in an industry with billions in revenue,” Michael Bruemmer, vice president of data breach resolution at Experian, told MarketWatch.

While video-game hacks are nothing new, it is now much more lucrative because of the industry’s massive growth and shift towards selling in-game assets. According to Newzoo, a gaming analytics firm, the industry is worth about $138 billion worldwide. 

Juniper Research, a specialist in digital markets, also found that the skin-trading industry, in which where gamers buy and sell valuable in-game items, was worth $50 billion in 2017. The majority of Fortnite’s revenue, which was over $1 billion as of July this year, comes from selling in-game add ons.

Young gamers, Experian’s report notes, are particularly at risk, especially if they do not fully understand security practices or believe they are in a trusted community. And with the explosive growth of games like Fortnite, which has 80 million monthly players and is hugely popular with kids and teens, more minors are playing games and are vulnerable. 

Earlier this year, for instance, hackers manipulated children playing Fortnite to give up their parents’ bank account details through a phishing scam.

Data theft isn’t the only pressing concern. Experian’s report cites an incident from July in which a hacker infiltrated Roblox, a popular online game among kids, and made customised animations that gang-raped a 7-year-old girl’s avatar. 

“Female gamers have long been harassed and threatened,” Experian wrote, “a situation that will get worse as more people enter an unregulated gaming world.”

Kotaku has created a gamer’s guide that helps users defend against hackers. Some companies, like Xbox, have parental controls in place to monitor children’s gaming activities, and the US Federal Trade Commission has agreed to investigate whether children are being lured into gambling via video games. 

Until the industry is more regulated, however, the report notes, players can take added security measures like downloading a password manager or enabling two-step authentication.

Quartz:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« What's Your Digital Data Worth?
Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Octo

Octo

Octo provides state-of-the-art cyber solutions so your organization can proactively defend itself from threats.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

NREL Clean Energy Cybersecurity Accelerator (CECA)

NREL Clean Energy Cybersecurity Accelerator (CECA)

The Clean Energy Cybersecurity Accelerator advances cyber innovation to defend modern, renewable energy technologies against high-priority cybersecurity risks to the energy sector.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.