Gamers Under Fire: Chinese Charge Alleged Fujacks Authors - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
8/22/2007
04:12 PM
50%
50%

Gamers Under Fire: Chinese Charge Alleged Fujacks Authors

The majority of malware written in China focuses on stealing gamers' user names and passwords for a growing underground ready to shell out cash to appear to be better players.

With four hackers being charged in China for creating and spreading the Fujacks worm, researchers say it shines a light on the growing number of cybercriminals going after the gaming community.

Li Jun, Wang Lei, Zhang Shun, and Lei Lei reportedly are facing charges in a people's court in Hubei Province in connection with the creation and distribution of the Fujacks worm, according to Sophos. Li Jun, 25, allegedly confessed to writing the worm and selling it to a dozen clients for $12,500 U.S.

Under Chinese law, the men could face five years or more in prison if convicted of writing and spreading the malicious software, Sophos researchers noted.

The worm, which also is known as Whboy, grabbed a lot of attention early this year with its tactic of converting icons of infected programs into a picture of a panda burning joss sticks as it steals user names and passwords from online game players. Joss sticks, according to Wikipedia, are incense sticks usually burned before a Chinese religious symbol or shrine.

Graham Cluley, senior technology consultant for Sophos, said in an interview that Chinese authorities rated the Fujacks worm a five-star risk, the country's highest security rating for malware. He added that the malicious code was embedded in about 3,500 Web sites, infecting visitors' machines.

Malware authors in China are increasingly writing code that will steal gamers' user names and passwords. Half of the world's 8 million online gamers come from China, according to Symantec's Internet Security Threat Report. With that much gaming activity going on, it's creating not just a target for hackers looking for a little fun, it's also creating a market for people to buy the identities of successful gamers.

Hackers specifically are going after the identities of people who are high scorers in games like World of Warcraft and Lineage. However, Cluley also points out that any gamer's user name and password is potentially valuable because about 40% of people use the same ones for everything from online games to their online bank accounts, PayPal accounts, and corporate logons.

"They'll steal your password and then they'll steal your personal goods or even apply for a loan in your name," said Cluley. "If they have that password, they might be able to sell it to other less-skilled gamers who want to appear to be better players, or they may very well have your banking password or your PayPal information."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll