Top 5 threats for online gamers and how to avoid them

We all know how much you enjoy playing – socially, professionally or casually – video games, which is why we want to take this opportunity to share more information about safe online gaming.

Previously we have discussed how to protect yourself while playing, with professional online gamers offering advice based on their knowledge and experience as users; and we have also talked about why security is important in every instance of game development.

Today we will talk specifically about some of the biggest threats online gamers face and, of course, how you can protect yourself. Below you will find the top five threats, in no particular order of importance.

#1 TeslaCrypt

We already know the destructive capabilities of ransomware – a type of malicious software that locks access to files or the system itself until a ransom is paid.

Mensaje de TeslaCrypt

Within this malware category, Teslacrypt stands out because it was designed to encrypt game-play data for dozens of video games, prompting the user to pay a ransom to decrypt those files. Targeting some well-known games including Call of Duty and Minecraft, Teslacrypt blocks access to saved game files, configuration files or game items.

If we take a look at the chart below, which shows the number of TeslaCrypt detections by ESET security products during 2016, we see that most observed activity was in March, reaching over half a million cases:

Detecciones de TeslaCrypt en 2016

However, there are two key points to mention. First, TeslaCrypt is no longer operational – its developers have shut down their file recovery service. Nonetheless, since the ransomware is still spreading and infecting systems, it remains a threat for online gamers. The good news is that the cybercriminals have released the master decryption key, and that ESET has released a decryption tool for TeslaCrypt that you can download if your system has been compromised.

Secondly, the ransomware that attacks video games is not that effective, since current games are often designed to save games and settings on the cloud servers of each developer, making it possible for the user to recover his files should they get lost. Therefore, the games that do not store files in the cloud are more likely to be affected by this ransomware.

#2 Password Stealers

Just as there are types of spyware called keyloggers, which capture keyboard events and try to steal access credentials, there are also pieces of malicious code that attempt to steal access credentials for online games or platforms, such as Steam or Origin.

This type of malware is heavily based on social engineering or deceit in order to infect its victims. One of the most popular scams is when a player – the victim – receives a chat message from another player offering him to join his team. This unknown player is usually very friendly and praises the victim for his gaming skills, telling him that he should join this team of great players.

Where is the deceit?

At some point, the victim is prompted to download and install an application – for example, a voice communication program. The attacker will be very insistent on the fact that the victim cannot become part of the team if he does not have that application. And of course, the downloaded executable is not really a chat client, but a malicious software capable of stealing account credentials.

chat

The picture above shows a fragment of a chat exchange with an attacker. ESET’s products detect and block a large number of variants. One of them is Win32/PSW.OnLineGames.NNU; in this case, apart from its credential stealing and keylogging capabilities, the malware looks for specific data of some well-known games like World of Warcraft. Another variant is Win32/PSW.OnLineGames.OUM, which receives and executes malicious commands from a remote server and attempts to neutralize the antivirus products present in the system.

So far, in 2016, the number of detections of the Win32/PSW.OnLineGames threats has reached over a quarter million:

Screen Shot 2016-08-31 at 17.06.23

There are also other threats worth mentioning, which specifically target the Steam platform: MSIL/Stimilik.H, a malicious code written in .NET that allows an attacker to remotely control the affected machine, and Win32/PSW.Steam.NBC, of similar characteristics. The case of Steamlocker is particularly interesting – a piece of malware that appeared in 2016 trying to follow the ransomware trend, that blocks access to the Steam service and then requests the payment of a ransom to retrieve it.

#3 Fake Game Cracks

This is another social engineering technique, regardless of the kind of threat installed in the end. The deceit in this case has to do with the fact that the victim thinks he is only installing a crack, when in fact, the file contains malware and sometimes it is not even capable of bypassing the game protections, as it claims to do.

To give you a concrete example, last month I found an alleged FIFA 16 crack online on the EA servers. It was offered via a Mediafire download link. Once downloaded, we noticed the file name, fifa16crack (SHA1: 39fb3bdd0a4424eb8bb0489309f6d42d79cee1ce), and the icon used to fool players:

Falso crack de Fifa 16

Although the alleged crack fulfills its function to play the game without a license, it also installs malware on the system. We can see that the file is really a self-extracting SFX that executes .bat files with specific commands to install a coin miner. The main problem is that the victim will notice a drop in the system performance, since system resources are being used by the cybercriminal to mine virtual currencies.

Coinminer escondido en falso crack

The picture above shows one of the miner’s configuration files. This particular case is a multipool that mines different types of coins, including other configuration files that are also able to mine the Monero cryptocurrency.

We should remember that because the crack is functional, this does not mean it will be free of malware. It is therefore essential to have an antivirus solution and not turn it off whenever those cracks request it so. Even today, we still see that some 10-year-old infected applications are still active, such as the modified versions of Aimbot or Wallhack Counter Strike, for example.

#4 Fake Apps

Nowadays, we not only play on consoles or PCs, but also on our smartphones or tablets. Therefore, we must be careful and pay special attention to those fake apps masquerading as official games, updates, tricks, etc.

Falsos juegos infectados en Google Play

Since 2015, there have been various malicious mobile applications masquerading as well-known games, which perform different types of attacks on the infected devices. Perhaps one of the most important cases has to do with an Android Trojan hidden among the games at Google Play, which allowed attackers to control devices remotely, thanks to its backdoor capabilities. By imitating games like Plants vs. Zombies 2 or Subway Surfers, it was mainly used to display ads on the compromised device.

Another prominent case is the one of fake Minecraft apps that install scareware, which were downloaded by more than 600,000 Android users. After showing the victims signs of fake viruses or threats on their devices, it then tried to convince users to subscribe to a premium SMS service in order to remove the fake threats.

Finally, I would like to mention the first lockscreen that tries to take advantage of the Pokémon GO fever. In this case, the false application blocks access to the system, which needs to be booted to keep on working. After reboot, however, the malicious application continues to run, silently clicking on porn ads on the background.

#5 Phishing

As professional FIFA player Patán told us, and as I mentioned myself after attending conferences on malware and the gaming industry, one of the most common attacks (and easiest to carry out) has to do with stealing access credentials through fake websites, or simply through users asking for the login information. To do this, cybercriminals register websites with a slight variation on the original domain name, for instance, by changing only one letter.

We can mention two of the best-known examples that affected Steam users: the fake Steam screensaver, which was in fact a password stealer phishing, and the fake Steam games that spread malware.

Recommendations

The aim of this article is not to scare you so that you stop playing games online. On the contrary, it is to raise awareness about the existing risks, which can be complemented by the following recommendations:

  • The same “old” story – never use old versions of games or applications. Since the updates fix vulnerabilities, it is absolutely necessary to update software as soon as possible.
  • Always have your antivirus software enabled on your computers – you should be suspicious of those applications that request you to disable your antivirus protection before installation. Also, if you are concerned about FPS and system performance, remember that, for example, ESET Smart Security has a Gamer mode that optimizes the performance of the antivirus solution so that you can enjoy your game without interruptions.
  • Ignore unknown chats requesting information: remember that game developers will never ask for your passwords. Activate two-factor authentication whenever it is available – thus, even if your password is lost or stolen, no one will be able to access your account without having the second verification factor. More information at:
    • Steam Guard / Steam Mobile Authenticator
    • Login verification for Origin
    • Blizzard/Battle.NET Authenticator
  • Change passwords regularly; use passphrases; and never use the same one for different accounts or services – sometimes the passwords and account data can be leaked (just remember the 6 biggest attacks on online games of the last few years). It is therefore a good idea not to use the same login data for different services.

Further reading – 8 security tips for gamers: go play with no worries!

Image credits: ©Stefaan Lesage/Flickr

Author , ESET

Follow us

Copyright © 2016 ESET, All Rights Reserved.