The most common cyber threats in the most popular video games |  TECHNOLOGY

Video game They can ensure hours of fun and entertainment thanks to their exciting stories and intricate worlds. So sometimes it is difficult to pay attention to all the details or what is happening around you.

Although it may not seem like it, video games can be the target of all types of cyber threats. Like any other technological and Internet content, hackers have established some ways to entice players to perform actions that endanger your privacy and cybersecurity.

MIRA: The incredible faces of GTA San Andreas characters in real life, according to an AI

According to Norton antivirus software, some of the most common problems that users face can range from malware (malicious software), viruses, account and identity theft, swatting (alert the authorities of a false emergency), doxing (theft of personal information) and spyware (spyware).

Next, we will tell you what are some of the ways in which cybercriminals carry out their attacks and what are the most used video games for this.

This is how threats operate

Video games are not completely free of cyber attacks. So you should pay special attention every time you enjoy your favorite franchise.

For Norton, there are at least three ways in which players can become victims of these cyber attacks. The first is through fake premium accounts. For example, there are services that promise these types of accounts to players. For this they request the Username and password.

Falling for this type of threats can be easy, since these sites usually imitate the style and identity of the brand of the video game in question.

To avoid this type of problem, the antivirus company recommends always making sure that the links are directly from the video game providers. Likewise, it invites you to have different passwords on each platform and make them unique and complex to prevent cybercriminals from stealing and using them.

He code malware It is another type of cyber threat to which video game lovers are exposed. Internet sites promise access to codes to unlock cheats within games, however, Norton points out that these could actually lead users to download malicious software, which can damage the system and even steal data.

The last one is closer than it seems. It is about the Youtube videos about tricks and tips that include links where netizens are recommended to download something infected with malware. Norton warns that he should be careful with those files or websites that ask him to deactivate or disable their software.

The 10 most attacked

Among all the extensive and varied catalog of video games, there are some that are the main targets of cybercriminals. Among them are some of the most popular and profitable titles and franchises in the industry. According to data collected in 2022 by Norton, these are the 10 video games with the most cyber threats:

Minecraft

An ‘open world’ construction video game, that is, with freedom in the way it is played. In 2016, it suffered one of the largest cyberattacks in history through a malicious software. It is the platform with the most attacks of this type.

Dota 2

In Spanish, Defense of the Ancestors 2, is an online battle game. The opportunity to participate in tournaments within the platform allows cybercriminals to take advantage of it to deceive users and steal their data while they register for competitions.

Day Z:1

It is a multiplayer survival video game. The search for cheat codes for the game and downloading malicious programs instead.

Grand Theft Auto

Known for its high levels of violence, the action-driving video game suffered a infiltration in 2022 after which information about its next installment (GTA6) was exposed to the public.

PUBG

It is an online battle video game. They are frequently found malicious sites on the Internet that pose as the official site of the game.

Pokemon

The Japanese franchise offers a series of role-playing video games. Cyberattackers have taken the opportunity to offer access to new card games in NFT format by installing a trojan which allows controlling the user’s equipment remotely.

Call of Duty

It is a popular war-style game franchise. Through videos of YouTube criminals offer download hacks (tricks) with malicious links They even ask the user to uninstall their antivirus before using them.

Counter Strike

The popularity of this war game franchise is used for the malware download in the name of their video games.

Provided

It is a survival game that offers different software packages. It is common account takeover and data theft associated with the game (such as credit card) through malicious links.

World of Tanks

In this video game, players face off in battles with tanks from the 20th century. Its users also run the risk of falling victim to malware and data theft.

Besides…

Other Cybersecurity measures

  1. Take care of your passwords: In addition to using a different security key for each platform, make sure they are strong enough. It is recommended to mix letters, numbers, symbols and a combination of upper and lower case. Avoid including personal information or number sequences and change them regularly.
  2. Keep your software up to date: Being up to date on updates to your operating system and your antivirus will allow you to deal with new threats effectively. Systems typically include new ways to secure your information and address vulnerabilities over time.
  3. Avoid sharing your personal information: try not to include data that can identify you (such as your name, date of birth or address) in your username, forums and other spaces for socializing with users.
  4. Use two-step verification: many platforms offer this option to their users, requiring confirmation through a code that arrives on the cell phone or email before allowing login.
  5. Consider installing a VPN: Virtual private networks (VPNs) are security tools that allow you to create a private network connection between devices over the Internet. Its operation involves hiding users’ IP addresses and encrypting data so that only authorized people can access it.

By Editor

Leave a Reply