Hackers Are Targeting Young Video Gamers

In the online gaming world, it’s normal to play and this is presenting an increasingly important security threat as the value of the industry grows and many players have come to accept bad behaviour and people who become friends who they don’t know from another country.

A new forecast report by Experian, the credit and identity theft protection firm, predicts that video-game data breaches will be a major issue in 2019. 

Cybercriminals can “easily pose as a gamer, build trust within a particular game or community, and gain access to privileged inside information,” the report said. 

This includes obtaining personal information like full names and phone numbers, as well as passwords and credit-card details. The report notes that hackers can also steal in-game tokens and weapons that can be worth a lot of money.

“We are not trying to imply all gamers are hackers, but they do live in an anonymous environment, have good computer skills, and are in an industry with billions in revenue,” Michael Bruemmer, vice president of data breach resolution at Experian, told MarketWatch.

While video-game hacks are nothing new, it is now much more lucrative because of the industry’s massive growth and shift towards selling in-game assets. According to Newzoo, a gaming analytics firm, the industry is worth about $138 billion worldwide. 

Juniper Research, a specialist in digital markets, also found that the skin-trading industry, in which where gamers buy and sell valuable in-game items, was worth $50 billion in 2017. The majority of Fortnite’s revenue, which was over $1 billion as of July this year, comes from selling in-game add ons.

Young gamers, Experian’s report notes, are particularly at risk, especially if they do not fully understand security practices or believe they are in a trusted community. And with the explosive growth of games like Fortnite, which has 80 million monthly players and is hugely popular with kids and teens, more minors are playing games and are vulnerable. 

Earlier this year, for instance, hackers manipulated children playing Fortnite to give up their parents’ bank account details through a phishing scam.

Data theft isn’t the only pressing concern. Experian’s report cites an incident from July in which a hacker infiltrated Roblox, a popular online game among kids, and made customised animations that gang-raped a 7-year-old girl’s avatar. 

“Female gamers have long been harassed and threatened,” Experian wrote, “a situation that will get worse as more people enter an unregulated gaming world.”

Kotaku has created a gamer’s guide that helps users defend against hackers. Some companies, like Xbox, have parental controls in place to monitor children’s gaming activities, and the US Federal Trade Commission has agreed to investigate whether children are being lured into gambling via video games. 

Until the industry is more regulated, however, the report notes, players can take added security measures like downloading a password manager or enabling two-step authentication.

Quartz:

You Might Also Read:

Training Young Hackers To Stop Cybercrime

« What's Your Digital Data Worth?
Russia Launched Cyber Attacks Against Ukraine Before Ship Seizures »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.