Montag, 23. September 2019, 09:23 UTC+2

Sie sind nicht angemeldet.

  • Anmelden

Fanatik Männlich

Meister des Ordens

Beiträge: 3 724

Vorname: Wolf

Wohnort: Hamburg


Freitag, 28. Mai 2010, 10:02

Symantec deckt 44 Millionen gestohlene Spielaccounts auf…-game-accounts/

Na wenn das kein Tritt nach China ist ^^


Symantec uncover 44 million stolen game accounts - 26 May, 2010

In the latest news from Symantec, a server has been identified as hosting the credentials of 44 million stolen gaming accounts, which are being systematically validated by a Trojan distributed to compromised computers. The database is said to be holding credentials for at least 18 Chinese based gaming websites.

As described in a blog post by Symantec researcher Eoin Ward, the database of stolen information includes about 210,000 stolen accounts for World of Warcraft, 60,000 for Aion, 2 million for PlayNC and 16 million for Wayi Entertainment*, all of which were being sold online. This equated to roughly 17GB of flat file data, and Symantec was able to analyse attempts to validate passwords for Wayi Entertainment.

"The particular database server we uncovered seems very much at the heart of this operation -- part of a distributed password checker aimed at Chinese gaming sites. The stolen login credentials are not just from particular online games, but include user login accounts associated with sites that host a variety of online games. In both cases the accounts contained in the database have been obtained from other sources, most likely using malware with information-stealing capabilities, such as Infostealer.Gampass," Ward writes.

Ward says, the purpose of the Trojan validation is to turn the stolen credentials into cash by identifying which game accounts are valid and can be sold. The trojan is being called Trojan.Loginck, and makes it faster for the thieves to validate 44 million stolen accounts before listing them for sale. According to Symantec's research, the value of stolen accounts credentials is said to range from $35 to several thousand dollars based on prices available on well known auction websites.

How did the database obtain so many stolen account details you ask? The answer is the almighty botnet!

2009 was hailed as "the Year of the Botnet" in a recent blog post by Symantec researcher Paul Wood. A Botnet is a term used to describe "robots" that run programs autonomously and automatically. In recent years, the term has become synonymous with malicious software networks, which work to distribute spam and malware for different criminal entities.

As recently as last week, the U.S. Federal Trade Commission (FTC) reportedly shut down California-based ISP Pricewert LLC (also known as 3FN and APS Telecom), a notorious rogue internet service provider that specialised in the deployment of botnets and the distribution of illegal, malicious and harmful content such as spam and malware ( Read More )

* Wayi International Digital Entertainment Co., Ltd is primarily engaged in the research, development and distribution of online games such as Special Force Online, 81keys Online and GE Online.
Knüpft noch einen auf!
  • Zum Seitenanfang

Kéldorn Männlich


Beiträge: 1 995

Vorname: Michael

Wohnort: Leipzig

Beruf: Staatsdiener


Freitag, 28. Mai 2010, 12:02

*g* wen wundert das...China selber hat nie abgestritten sogar staatliche Hackerabteilungen zu haben bzw. ihren Unis Geld dafür zu geben das die Studenten "feindliche" Netzwerke angreifen.
- Diene dem allgemeinen Wohl - Beschütze die Unschuldigen - Erhalte das Gesetz -

  • Zum Seitenanfang

Ähnliche Themen