Americas

  • United States

Asia

Oceania

ellen_messmer
Senior Editor, Network World

44 million stolen gaming credentials found

News
May 26, 20102 mins
CybercrimeData and Information SecurityLegal

Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts -- and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers.

Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts — and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers.

The purpose of this Trojan-based validation is apparently to figure which credentials are valid and can be sold. Symantec is calling this the Trojan.Loginck, and as described in a blog post by Symantec researcher Eoin Ward, the database of stolen information includes about 210,000 stolen accounts for World of Warcraft, 60,000 for Aion, 2 million for PlayNC and 16 million for Wayi Entertainment, all of which were being sold online.

Symantec is recommending users of these sites change their passwords.

“The particular database server we uncovered seems very much at the heart of this operation — part of a distributed password checker aimed at Chinese gaming sites. The stolen login credentials are not just from particular online games, but include user login accounts associated with sites that host a variety of online games,” Ward writes.

In his blog, Ward says to turn the gaming credentials into cash, the cybercrooks have apparently written a program that checks the login details using Trojan.Loginck to make sure they are valid, which is easier than trying to log into gaming sites 44 million times.

The value of stolen accounts credentials can range from $35 to several thousand dollars, according to Symantec’s research, which sought a rough market value based on prices associated with www.playerauctions.com, described as a legitimate Web site to protect buyer and seller against fraud.

“Most botnets have the ability to download and run files, so why not push a custom piece of malware to each bot? The malware could log on to the database and download a group of user names and passwords in order to check them for validity,” Ward writes. The database in question was holding 17GB of flat file data, and Symantec analyzed its attempts to validate passwords for Wayi Entertainment. There are said to be credentials for at least 18 gaming Web sites in the database.

Read more about wide area network in Network World’s Wide Area Network section.