2024-12-23 08:02:25
Author: Akamai Technologies / 2023-07-23 21:09 / Source: Akamai Technologies

Akamai Threat Research Points To Gaming Industry As A Rising Target With 12 Billion Attacks And Counting

Akamai Threat Research Points To Gaming Industry As A Rising Target With 12 Billion Attacks And Counting

HONG KONG and TAIPEI,July 25,2019 -- According to the Akamai2019 State of the Internet / Security Web Attacks and Gaming Abuse Report,hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report (November 2017 – March 2019). This puts the gaming community among the fastest rising targets for credential stuffing attacks and one of the most lucrative targets for criminals looking to make a quick profit. During the same time period,Akamai saw a total of 55 billion credential stuffing attacks across all industries.

The report also reveals that SQL Injection (SQLi) attacks now represent nearly two-thirds (65.1%) of all web application attacks,with Local File Inclusion (LFI) attacks accounting for 24.7%. The report's data shows that SQLi attacks have continued to grow at an alarming rate as an attack vector,with a spike in activity during the 2018 holiday shopping season and a continued elevated trend since that time. In the first quarter of 2017,SQLi attacks accounted for 44% of all application layer attacks.

The bridge between SQLi and credential stuffing attacks is almost a direct line. The majority of the credential stuffing lists circulating on the darknet and on various forums use data that originated from some of the world's largest data breaches,and many of them have SQLi as a root cause. In fact,earlier this year Akamai researchers discovered a video where viewers were instructed on how to conduct SQLi attacks against vulnerable websites,and then use the credentials obtained to generate lists that can be leveraged in credential stuffing attacks against a popular online game.

"One reason that we believe the gaming industry is an attractive target for hackers is because criminals can easily exchange in-game items for profit," said Martin McKeay,Security Researcher at Akamai and Editorial Director of theState of the Internet / Security Report. "Furthermore,gamers are a niche demographic known for spending money,so their financial status is also a tempting target."

In one example of these attacks,criminals target popular games looking for valid accounts and unique skins,which are used to change the appearance of an item in a video game. Once a player's account is successfully hacked,it can then be traded or sold.

Hackers appear to place more value on compromised accounts that are connected to a valid credit card or other financial resources. Once these accounts are compromised,the criminal can purchase additional items,such as currency used within the game,and then trade or sell the hijacked account at a markup.

"While gaming companies continue to innovate and improve their defenses,these organizations must also continue to help educate their consumers on how to protect and defend themselves," said McKeay. "Many gamers are young,and if they are taught best practices to safeguard their accounts,they will incorporate those best practices for the rest of their lives."

Geographic highlights from the Akamai 2019 State of the Internet / Security Web Attacks and Gaming Abuse Report include:

Nearly 67% of application layer attacks target organizations based in the United States.

Russia is the second largest source of application attacks,but nowhere to be found in the top 10 target countries. Similarly,China is ranked as the fourth highest source country,but not among the top 10 target countries.

Conversely,the United Kingdom is the second highest targeted country,but only tenth on the source country list. Japan,Canada,Australia and Italy are all also among the countries most targeted,but not on the top 10 source list.

While the United States is overwhelmingly the top source country for credential stuffing attacks across all verticals,Russia and Canada take the top two spots targeting the gaming sector.

While not among the top 10 source countries for application layer attacks,Canada is the fourth highest source country for credential stuffing attacks

Vietnam is the ninth largest source country for credential stuffing attacks,but ranks fourth when targeting the gaming sector.

The Akamai 2019 State of the Internet / Security Web Attacks and Gaming Abuse Report is available for download here. For additional information about credential abuse – specifically credential stuffing – and advice for organizations facing these types of attacks,visit Akamai's resource site.

About Akamai

Akamai secures and delivers digital experiences for the world's largest companies. Akamai's intelligent edge platform surrounds everything,from the enterprise to the cloud,so customers and their businesses can be fast,smart,and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions,apps and experiences closer to users than anyone-- and attacks and threats far away. Akamai's portfolio of edge security,web and mobile performance,enterprise access and video delivery solutions is supported by unmatched customer service,analytics and 24/7/365 monitoring. To learn why the world's top brands trust Akamai,visit www.akamai.com,blogs.akamai.com,or @Akamaion Twitter.

Akamai Statement Under the Private Securities Litigation Reform Act


This release contains information about future expectations,plans and prospects of Akamai's management that constitute forward-looking statements for purposes of the safe harbor provisions under The Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including,but not limited to,failure of the IoT market to develop as expected,changes to Akamai's investment strategy,inability of the newly-introduced solution to operate as expected,provide the potential benefits described or address intended market needs,a failure of Akamai's network infrastructure,and other factors that are discussed in Akamai's Annual Report on Form 10-K,quarterly reports on Form 10-Q,and other documents periodically filed with the SEC.

Logo - https://photos.prnasia.com/prnh/20190320/2408932-1LOGO?lang=0

Tags: Computer Networks Computer/Electronics Electronics Gaming Entertainment High Tech Security Internet Technology Telecommunications

Previous:

Next:

Leave a comment

CUSMail

CusMail provide the Latest News , Business and Technology News Release service. Most of our news is paid for distribution to meet global marketing needs. We can provide you with global market support.

© CUSMAIL. All Rights Reserved. Operate by Paid Release