[ad_1]
“Call of Duty” players who were looking for third-party “cheat” software to control the popular first-person shooter were among the victims of a targeted phishing attack, cybersecurity firm VX Underground said Wednesday. It was announced on .
The attack also targeted players looking for “paid cheat” software to use on Activision Blizzard’s Battle.net, the PC platform for games such as World of Warcraft, Overwatch, and Diablo. This cheat software can be used to install cryptocurrency draining malware on a user’s computer and access Bitcoin information to swipe coins from his wallet.
“Over the past few days, we have become aware of the presence of malware targeting gamers,” VX Underground said on Twitter. “More specifically, currently unidentified attackers are using an ‘information stealer’ to target individuals who engage in pay-to-cheating in video games.”
According to VX Underground, the cryptocurrency exfiltration malware could affect more than 4.9 million accounts in total, including approximately 3.7 million Battle.net accounts, more than 560,000 Activision accounts, and approximately 117,000 ElitePVPers accounts.
A crypto wallet drainer is malware that is installed as an application on a user’s computer or browser extension and targets a user’s hot wallet. In January, cybersecurity firm Kaspersky warned Mac users about an exploit targeting Bitcoin and Exodus wallets.
VX Underground confirmed that the leaker in this incident targeted the Electrum Bitcoin wallet, but the exact amount stolen is unknown.
“The scope of the impact is enormous, and in a strange twist of fate, Activision Blizzard is working with cheat providers to assist users affected by this massive information theft campaign,” they said.
The malware attack also included cheat providers UnknownCheats and PhantomOverlay, which compromised 572,831 and 1,365 accounts, respectively. As VX Underground explained, PhantomOverlay was alerted to the attack by users who reported fraudulent purchases.
“When Elite PVPers was contacted by PhantomOverlay administrative staff about the compromised accounts, Elite PVPers confirmed that it had identified over 40,000 valid user accounts that had been compromised,” VX Underground said.
VX Underground did not immediately respond. of decryption Request for comments.
An Activision Blizzard spokesperson emphasized that this attack is not just related to the company’s games or platforms, nor is it directly related to the company’s servers.
“There are claims that malware from downloading or using unauthorized software could compromise the credentials of some players across the industry. Activision Blizzard servers are secure and have not been compromised.” a spokesperson said. Decryption on mail.
“Our priority is always the security of player accounts,” Activision’s statement continues. “If you think a player may have clicked on a suspicious link, or want to make sure your account is protected, please change your password and follow the best practices recommended here. I can. [two-factor authentication]”
As of this writing, VX Underground did not yet know how the hackers distributed the malware, but traditionally malware is sent to victims via malicious websites, phishing emails, or after being clicked on. It entered through a message that installed a program on your computer.
Other forms of malware (such as clone websites) empty the wallet after a victim signs a transaction in their browser wallet, unknowingly giving hackers access to their funds and NFTs.
On Tuesday, the founder of the Bitcoin Ordinals project Ordinal Rugs announced that he was the victim of a wallet drainer phishing attack targeting the Bitcoin Rock Discord server. The thieves stole 1.47 BTC (approximately $103,003) and his Ordinal inscription worth 4 BTC (approximately $208,196) from the wallet of the pseudonymous founder Archon.
“No associated funds/accounts/logins” [Ordinal Rugs] Affected… This is just my personal wallet and I have only myself to blame here,” Alcon said on Twitter. “Needless to say, I will not allow something like this to happen again.”
Edited by Andrew Hayward
[ad_2]
Source link