Menu
New ransomware program targets gamers

New ransomware program targets gamers

The program encrypts game saves, mods, maps and other user-generated content for a large number of popular games

A new malware program attempts to extort money from gamers by encrypting game saves and other user-generated files for popular computer games.

The new threat, which claims to be a variant of the notorious CryptoLocker ransomware, targets 185 file types, over 50 of which are associated with computer games and related software.

This is the first ransomware program to specifically target games, according to researchers from security firm Bromium, which recently found it. It was distributed via a drive-by download attack from a compromised website that directed users to the Angler exploit kit.

The malicious program encrypts game saves, maps, profiles, replays, mods -- in other words, custom content that users would not be able to recover by simply reinstalling the game.

The list of computer games targeted by the new threat include popular titles like Call of Duty, StarCraft, Diablo, Fallout, The Elder Scrolls, Warcraft, Minecraft, Assassin's Creed, Bioshock, World of Warcraft, League of Legends and World of Tanks. The digital game distribution platform Steam and developer tools like RPG Maker, Unreal Engine and Unity3D are also targeted.

"Many young adults may not have any crucial documents or source code on their machines -- even photographs are usually stored at Tumblr or Facebook -- but surely most of them have a Steam account with a few games and an iTunes account full of music," Bromium security researcher Vadim Kotov said in a blog post.

While the new ransomware program claims to be a variant of CryptoLocker, its creators are likely only reusing that name. The similarity between the new sample and the original CryptoLocker binaries is only around 8 percent, which is negligible, the Bromium researchers said.

CryptoLocker paved the way for the rise of file-encrypting malware. Researchers estimate that it has earned its creators around $3 million over nine months of operation until it was shut down in May 2014 following a multi-national law enforcement operation.

The new game-targeting ransomware program claims to be using strong encryption with 2048-bit RSA keys, but the Bromium researchers are still analyzing it to determine if that is accurate or if there is any way to decrypt the files without paying the ransom. Like most file-encrypting programs, the new threat requires the ransom to be paid in bitcoin cryptocurrency and hosts the page for obtaining the decryption key on the Tor anonymity network.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags fraudmalwareBromium

Events

Featured

Slideshows

Channel kicks 2021 into gear as After Hours returns to Auckland

Channel kicks 2021 into gear as After Hours returns to Auckland

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Pantry at Park Hyatt in Auckland to kick-start 2021.

Channel kicks 2021 into gear as After Hours returns to Auckland
The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Show Comments