• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Prism Drive Secure Cloud Storage: Lifetime Subscription (10TB) for $89

    Prism Drive Secure Cloud Storage: Lifetime Subscription (10TB) for $89
  • Mashvisor: Lifetime Subscription (Professional Plan) for $199

    Mashvisor: Lifetime Subscription (Professional Plan) for $199
  • Beducated: Lifetime Subscription for $99

    Beducated: Lifetime Subscription for $99
  • Amysen Wi-Fi Smart Plug (4-Pack) for $23

    Amysen Wi-Fi Smart Plug (4-Pack) for $23
  • Refurbished Apple iPad 4 (2012) WiFi Black / 16GB / Grade A for $76

    Refurbished Apple iPad 4 (2012) WiFi Black / 16GB / Grade A for $76
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How cybercriminals tailor attacks for different age groups of gamers

Mar 1, 2023 by iHash Leave a Comment


These days, a 12 or 13-year-old kid can become a professional eSports player, while the youngest of them began his career at the ripe old age of… four! The gaming world has become much younger, but all gamers — both children and adults — face multiple cyberthreats. And scammers tailor each of their schemes with a particular age audience in mind.

Although children spend less time playing online games than adults, they remain one of the most sought-after targets for cybercriminals: after all, a kid can often easily lead you to their parent’s bank card.

Free cheese still smells nice

One of the most common scams targeting young gamers takes the form of an offer to generate in-game currency for free. That’s because kids today would rather get in-game currency from their parents than pocket money. To be the coolest-of-the-cool in pretty much any online game, you need virtual coins, and lots of them — such as V-bucks in Fortnite or Robux in Roblox. To avoid having to ask their parents to fork out, children are always on the lookout for free coins, which makes them vulnerable to cybercriminals.

Relying on most children’s rudimentary knowledge of cybersecurity, scammers don’t even bother with clever schemes: they literally spell out what data they want from their victims. For instance, on one phishing site that pretends to generate gems — the currency of the popular children’s game Brawl Stars — users are asked to answer just four questions to get as many gems as they please. As well as the desired number of gems and their in-game name, the user also has to hand over the e-mail address linked to the Supercell online game store and, guess what, the password for it! Why the young gamer needs to share this data, the creators of the site never explain.

Now in possession of the victim’s e-mail, the attackers can get a security code to log in to the Supercell account and hijack it by changing the password. So, instead of picking up lots of free gems, the unfortunate player may lose both their mail account and all their accumulated experience and currency in Brawl Stars.

Free cheeeeeese!

Free cheeeeeese!

Other scams are even more primitive. One site we found invited users to download Valorant cheats that give an advantage over other players, together with a detailed installation guide.

One of the instructions was to disable all antivirus software before installing the file — otherwise the cheat would be flagged as a false positive and not be installed. The executable file is packed in a password-protected Winrar archive, the contents of which cannot be checked by the antivirus before unpacking, and it must be “Run as administrator” so that the virus gains full access to the victim’s computer. The longer the victim’s antivirus is disabled, the more data the scammers can potentially pump out. It helps if the child has their own computer, but what if it’s a shared home computer full of parental data, including passwords and bank card details?

The winner takes it all. From your PC.

The winner takes it all. From your PC.

Almost any adult would smell the cheese in the mousetrap, but to kids who know little about cybercriminal tricks, nothing feels off. Statistics show that malware disguised as Minecraft or Roblox was downloaded 3–4 times more often than games for mature audience. For more examples of child-targeting scams, see our threat report for young gamers.

The more experienced the player, the trickier the scam

To fool hardcore gamers, scammers have to be far more sophisticated. Targeting an adult audience, they create phishing sites that mimic 18+ games, such as GTA Online. But the result is the same: the victim is either scammed out of their data and game account, or asked to take an online “I’m not a robot” test, with the offer of a prize — for example, the latest iPhone or a PlayStation 5. Only, to receive it, a small commission needs to be paid. And as you may have guessed, after paying this the gamer gets no prize and may compromise their bank card instead.

Haven't you seen the "Grand Theft" inscription? You were warned...

Haven’t you seen the “Grand Theft” inscription? You were warned…

Also this year, cybercriminals have learned how to mimic the in-game stores of such popular games as CS:GO, PUBG, and Warface. To get a good skin at a low price, victims had to enter their credentials for Steam, or even for social networks like Twitter or Facebook. As soon as they entered this data, their account fell straight into the hands of the cybercriminals, and all the skins and artifacts there were sold to other gamers.

A farewell to arms

A farewell to arms

Another common trick is to offer bundles (tens or even hundreds) of licensed games for peanuts. But this meager sum must be paid from your bank card. Or you can get a “Battle pass” for free, but to confirm, say, your age, you need to give the numbers on both the front and back of your credit card. No prizes for guessing that this data will most likely be stolen and then sold on the dark web.

It won't ever be as cheap as this! Oh, wait…

It won’t ever be as cheap as this! Oh, wait…

How to protect yourself against such threats?

Whether you’re a rookie or hardcore gamer, the threats you face are the same, and it’s worth knowing how to guard against them:

  • Use strong passwords — a unique one for each account. Then, even if one of your accounts is hijacked, the others will still be yours. Don’t trust your memory? A password manager can help.
  • Protect your accounts further with two-factor authentication.
  • Use virtual bank cards and refill their balance exactly for the purchase amount. By entering the numbers from your bank card, you risk losing all the funds you have there. And remember that a bundle of licensed games selling for a song is a reason to be wary.
  • Install a reliable antivirus solution on your computer — one that works seamlessly with Steam and other gaming platforms.

Kaspersky’s antivirus products have a special game mode that automatically activates when you start games. Antivirus database updates, scheduled drive scans, and notifications are suspended in this mode, but protection continues to run in the background. Which means:

  • your system is securely protected from any malware;
  • your personal data is monitored for leaks;
  • your passwords are stored in a secure, encrypted vault;
  • all links you follow are checked for scams and phishing;
  • your IP address is hidden by a VPN, which encrypts transmitted data and, by choosing the right server, improves ping/latency;
  • finally, the operating system settings are optimized so you don’t lose a single millisecond of gaming.





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Age, attacks, cybercriminals, gamers, Groups, tailor

Special Offers

  • Prism Drive Secure Cloud Storage: Lifetime Subscription (10TB) for $89

    Prism Drive Secure Cloud Storage: Lifetime Subscription (10TB) for $89
  • Mashvisor: Lifetime Subscription (Professional Plan) for $199

    Mashvisor: Lifetime Subscription (Professional Plan) for $199
  • Beducated: Lifetime Subscription for $99

    Beducated: Lifetime Subscription for $99
  • Amysen Wi-Fi Smart Plug (4-Pack) for $23

    Amysen Wi-Fi Smart Plug (4-Pack) for $23
  • Refurbished Apple iPad 4 (2012) WiFi Black / 16GB / Grade A for $76

    Refurbished Apple iPad 4 (2012) WiFi Black / 16GB / Grade A for $76

Reader Interactions

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Mashvisor: Lifetime Subscription (Professional Plan) for $199

Oct 3, 2023 By iHash

What Does the Commercialization of Generative AI Mean for Society?

Oct 2, 2023 By iHash

Tags

* Apple attacks Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Prism Drive Secure Cloud Storage: Lifetime Subscription (10TB) for $89

Expires January 01, 2030 05:00 PST Buy now and get 87% off KEY FEATURES Free up space on your phone, tablet, laptop, or home computer. Keep all your important files securely in one place. Easily share large files, like video, graphics, images, and audio. Access files from your computer, your phone, or your tablet. Preview […]

Beducated: Lifetime Subscription for $99

Expires January 01, 2024 07:59 PST Buy now and get 66% off KEY FEATURES Learn how to have great sex with Beducated, the #1 online platform for pleasure-based sex education. The extensive library boasts 100+ online courses on everything from basic oral sex guides to rope-bondage tutorials, all produced by the world’s top experts. As […]

Amysen Wi-Fi Smart Plug (4-Pack) for $23

Expires October 03, 2123 07:59 PST Buy now and get 52% off KEY FEATURES Introducing the Amysen smart plug – your ultimate home automation solution. Compatible with Alexa and Google Assistant, this smart plug allows for voice control and seamless integration with your smart home ecosystem. The schedule feature enables you to set specific times […]

Video Highlights: Vicuña, Gorilla, Chatbot Arena and Socially Beneficial LLMs — with Prof. Joey Gonzalez

Why Car Storage Depends on the Right Workload Analysis In this sponsored post, Russell Ruben, director of automotive and emerging segment market, Western Digital, believes that as vehicle innovation continues over the next few years, driven by advances in sensors, 5G, AI, machine and deep learning and big data analytics, so must storage. Storage technology […]

Swift 5.9 Released

Swift 5.9 is now available! 🎉 This is a major new release that adds an expressive macro system to the language and introduces support for integrating Swift into C++ codebases through bidirectional interoperability. It also introduces parameter packs, an improved expression evaluator while debugging, enhanced crash handling, Windows platform improvements, and more. Read on for […]

Anaconda’s State of Data Science Report Report Reveals Surge in AI Upskilling Among Data and IT Professionals

Anaconda Inc., provider of the popular platform for data science and modern AI development, released its sixth annual State of Data Science report, surfacing insights into today’s vibrant data science community and the growth and usage of AI and open-source software.  Unlike previous years, the 2023 report delves into the ways generative artificial intelligence (AI) is reshaping […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT