Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts -- and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers. Symantec says it has unearthed a server hosting the credentials of 44 million stolen gaming accounts — and one of the most surprising aspects of it is that the accounts were being validated by a Trojan distributed to compromised computers.The purpose of this Trojan-based validation is apparently to figure which credentials are valid and can be sold. Symantec is calling this the Trojan.Loginck, and as described in a blog post by Symantec researcher Eoin Ward, the database of stolen information includes about 210,000 stolen accounts for World of Warcraft, 60,000 for Aion, 2 million for PlayNC and 16 million for Wayi Entertainment, all of which were being sold online.Symantec is recommending users of these sites change their passwords.“The particular database server we uncovered seems very much at the heart of this operation — part of a distributed password checker aimed at Chinese gaming sites. The stolen login credentials are not just from particular online games, but include user login accounts associated with sites that host a variety of online games,” Ward writes. In his blog, Ward says to turn the gaming credentials into cash, the cybercrooks have apparently written a program that checks the login details using Trojan.Loginck to make sure they are valid, which is easier than trying to log into gaming sites 44 million times.The value of stolen accounts credentials can range from $35 to several thousand dollars, according to Symantec’s research, which sought a rough market value based on prices associated with www.playerauctions.com, described as a legitimate Web site to protect buyer and seller against fraud. “Most botnets have the ability to download and run files, so why not push a custom piece of malware to each bot? The malware could log on to the database and download a group of user names and passwords in order to check them for validity,” Ward writes. The database in question was holding 17GB of flat file data, and Symantec analyzed its attempts to validate passwords for Wayi Entertainment. There are said to be credentials for at least 18 gaming Web sites in the database.Read more about wide area network in Network World’s Wide Area Network section. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe