Attacks/Breaches
5/27/2010
02:42 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Cybercriminals Deploy Special Trojan To Verify Stolen Credentials

Researchers find database with 44 million stolen gaming credentials

Researchers from Symantec have discovered a staggeringly large cache of stolen online gaming credentials -- some 44 million of them -- in a heist where the operators are using a specially crafted Trojan to automatically validate the booty.

Symantec says the server contains login credentials from games as well as sites that host online games. "In both cases the accounts contained in the database have been obtained from other sources, most likely using malware with information-stealing capabilities, such as Infostealer.Gampass," according to a blog post by the researchers.

The researchers say the owner of the stolen goods wrote the so-called "Trojan.Loginck" to automate the process of monetizing the credentials. The botnet-driven Trojan.Loginck automatically logs into the stolen goods database and deposits stolen user names and passwords while checking their validity.

"If the Trojan succeeds in its task of logging in, it will update the database with the time it logged in and any user credentials (such as current game level, etc.) before moving to the next user name and password. The attackers can then log on to the database and search for the valid user name and password combinations," the researchers blogged.

Symantec says the bad guys' database holds around 17 gigabytes of flat-file data and contains credentials from at least 18 gaming websites, mainly Chinese gaming sites.

Gaming credentials can be worth anywhere from $6 to $28,000 on the black market, according to Symantec, depending on the game.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.