SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Games Hackers Play: Security Threats for Online Game Portals

How malicious hackers choose their targets?
They favor popular applications and web sites since there’s no sense in attacking things that
few people use. They love low-hanging fruit, those easy-to-execute attacks that take advantage
of known vulnerabilities. And most recently they have shown a decided preference for utilizing
interactive web sites to distribute malicious code.

So when you are working to determine what will attract the interest of cybercriminals next --
what venues you would use if you wanted to easily sneak some nasty code into lots of
computers -- it makes sense to look at popular online destinations that rely heavily on protocols
and program code that historically harbors potentially unpatched vulnerabilities.

One of the most obvious probable targets is casual game portals. 87 million people in the US
alone visited online game websites during the month of May, according to marketing research
company comScore. As interest in casual gaming flourishes and grows, historical application
security attack patterns indicate that game portal sites will increasingly become highly preferred
targets.

Any web site that is collecting data that is sellable for a profit -- specifically credit and debit card
information -- needs to ensure that its security profile is as robust as possible. Casual Game
portals also need to ensure that their sites and the applications that they host do not expose
their users to hack attacks. In its 2009 Data Breach Investigations Report, Verizon Business
found that of the 90 breaches in 2008 that it examined, 79% were compromised via web
applications.

Whether games are played in a web browser environment or downloaded onto a user’s
computer, it’s important to ensure that end users are not being exposed to malicious or flawed
code. No business wants to deal with the expense, damage to reputation, and loss of investor
confidence that follows a breach, whether that breach exposes critical data, enables players to
bypass payment and other system controls, or exposes users’ computers to criminal attack.
Anatomy of a Gaming Attack
As we are trying to prevent attacks we won’t be offering deep details on exactly how casual
game sites themselves and the games they host could be hacked. But it’s certainly no secret
that there are Flash player vulnerabilities that allow malicious hackers to craft content that
installs unwanted software on computers that access that content. Flash/JavaScript sandboxing
does a decent job of limiting code’s access to resources of players’ computers, but that doesn’t
mean that casual games -- and the portals that provide them -- aren’t hackable. Players have
created workarounds that let them to score higher and bypass game controls, and legit
programmers looking to bypass sandbox restrictions have found ways to do so. Hewlett
Packard recently analyzed nearly 4,000 Web apps developed with the Flash platform and found
that 35 percent violate Adobe's security best practices.

Marketing and advertising firms are increasingly looking to partner with casual game portal sites
and developers to piggyback their product messaging onto the success of the games. Game
sites are also forging connections with social networking sites. But as casual game developers
add enhanced functionality -- such as dynamic advertising, geographic targeting, and
connections with social sites -- more attack venues will open up. The simplicity of casual games
was their best defense against hack attacks, but that defense is slipping away.

Good programmers can sometimes slip and write bad code, and even good code can
sometimes turn bad when exposed to unexpected conditions. Online games, like any modern
connected application, interacts with other applications and services developed by third parties,
creating web application security holes that the original programmers didn’t envision. That’s just
one of the reasons that extremely well-known attacks like SQL injections, cross-site scripting
and buffer overflows remain so pervasive:

       SQL injection is an attack method that enables hackers to force an incorrectly
       configured database into performing unauthorised actions. One does this by appending
       a command to the end of a valid request string. SQL Injection can be used to do
       anything a fully authorized system administrator could do, including access/copy/deleting
       data and remotely executing stored procedures.
       Buffer Overflow occurs when an attacker forces an application to put an inordinate
       amount of data into its buffer -- the section of memory allocated to it -- or forces the
       application to put data outside of its buffer. When this occurs it is sometimes possible to
       force the application to execute malicious code, often with the goal of gaining remote
       access privileges over an affected system. Many Flash Player exploits are carried out
       via buffer overflow attacks.
       Cross-site scripting, also known as “XSS” (so as not to be confused with cascading
       style sheets, which is commonly abbreviated as CSS) have been topping the most
       widely exploited threats lists for the past several years. XSS flaw occurrence in websites
       is alarmingly high, with some reports indicating that anywhere from 60-68% of all active
       sites are wide open to XSS attacks. Attackers use XSS vulnerabilities to insert their own
       bits of malicious code into a site, circumventing existing security protections. The end
       result of a successful exploit ranges widely, including hijacking users to other websites,
       extracting payment/account data, reconfiguration of cookies, inserting malicious code
       into advertising, and more. Essentially, any legitimate action that can be performed with
       a script can be reconfigured to work to the hacker’s advantage.
The other reason that flaws like this exist is due to all-too-common bad security testing
practices, mistakes made in the rush to release or because programmers are unfairly expected
to do double-duty as security experts. These mistakes include weak/default passwords, ports
left open, permissions left undefined, an unprotected directory that anyone with a bit of
knowledge can access and rewrite, and more.

       Online Cheating: While online games are fast becoming the most sought after
       applications on the Internet, cheating has emerged as a notable phenomenon in current
       game play. Online cheating is an important security issue that distinguishes online
       games from other E-commerce applications, though some cheats in online games may
       find similar exploits in other E-commerce applications.

With advancement of newer technologies in online gaming approach newer cheating forms
have been identified and our understanding about game cheating has also increased. Some of
the newer techniques which have got special relevance to online games are as follows:

   a) Exploiting Misplaced Trust: Many cheats involve tampering with game code,
       configuration data, or both, on the client side. A cheater can modify his game client
       program, data, or both, and then replace the old copy with the revised one for future use.


   b) Collusion: People can agree with each other to gain unfair advantages over their
       honest opponents in online games. For example, the so-called “win-trading” was a
       collusion cheat widely seen in the popular StarCraft game, in which two cheaters
       colluded with each to lose to the other alternately in the ladder competition.


   c) Abusing the Game Procedure: This form of cheating may be carried out without any
       technical sophistication, and a cheater simply abuses the operating procedure of a
       game. One common case that we have observed in many online games is escaping: a
       cheater disconnects himself from the game system when he is going to lose.


   d) Related to Virtual Assets: Trading of virtual characters and items (e.g. clothing,
       weapons, homes and magical objects) acquired in games is a new and real business
       created by online games. Many players would like to have good characters, or improve
       the status of their own characters by getting some items in the game. Nonetheless, it is
       not easy for every player to get good characters and items, which require gaming skills
       and time. Where there is demand, there is supply, and then there is a market! Now
       virtual characters and items become virtual assets, or real assets in a virtual world, and
       many of them have been auctioned for real money on eBay.


   e) Exploiting Machine Intelligence:          Artificial intelligence techniques can also be
       exploited by a cheating player in some online games. For example, the advancement of
       computer chess research has produced many programs that can compete with human
       players at the master level. When playing chess online, a cheater can look for the best
       candidates for his next move by stealthily running a strong computer chess program.
f) Modifying Client Infrastructure: Without modifying game programs, configurations or
       data on the client side, a player can cheat by modifying the client infrastructure such as
       device drivers in his operating system. For example, he can modify a graphics driver to
       make a wall transparent so that he can see through the wall, locating other players who
       are supposed to be hidden behind the wall.


   g) Social Engineering: Social engineering is often used to steal passwords. There are
       many variations of this scam but all of them aim the same: to trick players to happily
       reveal their ID password pairs. Often these social engineers – password scammers – will
       attempt to trick a player into believing something attractive or annoying has happened to
       the player and his ID and password are needed for that purpose. They may approach a
       victim by phone, email, online chatting channels, or whatever they may exploit.


   h) Denying Service to Peer Players: A cheater can gain advantages by denying service
       to his peer players. For example, a cheater could delay the responses from his opponent
       by flooding his network connection. Other peer players would then be cheated into
       believing that there was something wrong with the network connection of the victim, and
       agree to kick him out from the game in order to avoid the game session being stalled.


It’s clear that any business that hosts web applications like casual games needs to be super
proactive about assuring the security of the site and the games they distribute. Beyond the
devastating hacks that expose customers’ information and/or their computer systems,
businesses also have to protect themselves from those who are looking to bypass payment
systems and access content for free. Strong security is an essential part of doing business
online, half-measures are a waste of time and budget. There’s no doubt that hackers will devote
plenty of time and effort to find that one nasty little hole that exists in an otherwise pristine web
portal.

Fight Back
What to do? Programming code reviews built into the development application security cycle are
an obvious must. Risk-adjusted security processes that pinpoint areas of particular concern are
helpful. Regular security self-assessments using an automated tool to scan the site
infrastructure and its applications to spot problems -- hackers will be using their own scanning
tools to spot exploitable issues on targeted websites -- is always a good thing, but there are
many classes of highly exploitable vulnerabilities which automated tools cannot easily spot. And
standard automated scanning tools can’t provide the essential complete picture either.

In contrast, penetration tests look at a system or application exactly the way the most highly
skilled malicious hackers do when they are looking for flaws to exploit, using procedures such
as in-depth interactive testing to force error conditions and analysis of the data flow through an
entire system to see how that data could be maliciously manipulated as it moves through
applications.

Application Penetration testing, such as those conducted on-demand by iViZ which are fine-
tuned to spot exploitable flaws in web-based applications and their host sites, reveal the issues
that exist in single applications, the problems that are created when applications interface with
each other and the probable impact of each discovered flaw.
Another critical defense method to keep in mind is that security at its best is always a dynamic
process. Programming code changes, new vulnerabilities crop up, new ways of bypassing
yesterday’s strong controls are constantly developed. The goal is to provide consistent
protection against known, current and emerging threats. Effective security is not an item on a to-
do list that can be completed, checked off, and never thought about again. It is and always will
be an ongoing process, not a finite project. Periodic web application security assessment
identifies potential vulnerabilities before they can cause damage and is a highly effective way to
ensure that a happy casual game portal doesn’t become a dangerous playground for
cybercriminals.

Be cautious about the difference in Vulnerability assessment and penetration testing. Always
insist for a penetration testing of your gaming application and not just vulnerability testing. Also
do a thorough research on how to choose good penetration testing companies

To read more about security of online travel portal visit blog.




References:

homepages.cs.ncl.ac.uk/jeff.yan/TEL.pdf

http://www.gamecareerguide.com/education/theses/20050610/A%20Legal%20Perspective%20on%20C
heating%20in%20Online%20Multiplayer%20Games.pdf

www.ivizsecurity.com/blog/

Contenu connexe

Dernier

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

En vedette

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

En vedette (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Online Games Security Threats - Quick Start Guide

  • 1. Games Hackers Play: Security Threats for Online Game Portals How malicious hackers choose their targets? They favor popular applications and web sites since there’s no sense in attacking things that few people use. They love low-hanging fruit, those easy-to-execute attacks that take advantage of known vulnerabilities. And most recently they have shown a decided preference for utilizing interactive web sites to distribute malicious code. So when you are working to determine what will attract the interest of cybercriminals next -- what venues you would use if you wanted to easily sneak some nasty code into lots of computers -- it makes sense to look at popular online destinations that rely heavily on protocols and program code that historically harbors potentially unpatched vulnerabilities. One of the most obvious probable targets is casual game portals. 87 million people in the US alone visited online game websites during the month of May, according to marketing research company comScore. As interest in casual gaming flourishes and grows, historical application security attack patterns indicate that game portal sites will increasingly become highly preferred targets. Any web site that is collecting data that is sellable for a profit -- specifically credit and debit card information -- needs to ensure that its security profile is as robust as possible. Casual Game portals also need to ensure that their sites and the applications that they host do not expose their users to hack attacks. In its 2009 Data Breach Investigations Report, Verizon Business found that of the 90 breaches in 2008 that it examined, 79% were compromised via web applications. Whether games are played in a web browser environment or downloaded onto a user’s computer, it’s important to ensure that end users are not being exposed to malicious or flawed code. No business wants to deal with the expense, damage to reputation, and loss of investor confidence that follows a breach, whether that breach exposes critical data, enables players to bypass payment and other system controls, or exposes users’ computers to criminal attack.
  • 2. Anatomy of a Gaming Attack As we are trying to prevent attacks we won’t be offering deep details on exactly how casual game sites themselves and the games they host could be hacked. But it’s certainly no secret that there are Flash player vulnerabilities that allow malicious hackers to craft content that installs unwanted software on computers that access that content. Flash/JavaScript sandboxing does a decent job of limiting code’s access to resources of players’ computers, but that doesn’t mean that casual games -- and the portals that provide them -- aren’t hackable. Players have created workarounds that let them to score higher and bypass game controls, and legit programmers looking to bypass sandbox restrictions have found ways to do so. Hewlett Packard recently analyzed nearly 4,000 Web apps developed with the Flash platform and found that 35 percent violate Adobe's security best practices. Marketing and advertising firms are increasingly looking to partner with casual game portal sites and developers to piggyback their product messaging onto the success of the games. Game sites are also forging connections with social networking sites. But as casual game developers add enhanced functionality -- such as dynamic advertising, geographic targeting, and connections with social sites -- more attack venues will open up. The simplicity of casual games was their best defense against hack attacks, but that defense is slipping away. Good programmers can sometimes slip and write bad code, and even good code can sometimes turn bad when exposed to unexpected conditions. Online games, like any modern connected application, interacts with other applications and services developed by third parties, creating web application security holes that the original programmers didn’t envision. That’s just one of the reasons that extremely well-known attacks like SQL injections, cross-site scripting and buffer overflows remain so pervasive: SQL injection is an attack method that enables hackers to force an incorrectly configured database into performing unauthorised actions. One does this by appending a command to the end of a valid request string. SQL Injection can be used to do anything a fully authorized system administrator could do, including access/copy/deleting data and remotely executing stored procedures. Buffer Overflow occurs when an attacker forces an application to put an inordinate amount of data into its buffer -- the section of memory allocated to it -- or forces the application to put data outside of its buffer. When this occurs it is sometimes possible to force the application to execute malicious code, often with the goal of gaining remote access privileges over an affected system. Many Flash Player exploits are carried out via buffer overflow attacks. Cross-site scripting, also known as “XSS” (so as not to be confused with cascading style sheets, which is commonly abbreviated as CSS) have been topping the most widely exploited threats lists for the past several years. XSS flaw occurrence in websites is alarmingly high, with some reports indicating that anywhere from 60-68% of all active sites are wide open to XSS attacks. Attackers use XSS vulnerabilities to insert their own bits of malicious code into a site, circumventing existing security protections. The end result of a successful exploit ranges widely, including hijacking users to other websites, extracting payment/account data, reconfiguration of cookies, inserting malicious code into advertising, and more. Essentially, any legitimate action that can be performed with a script can be reconfigured to work to the hacker’s advantage.
  • 3. The other reason that flaws like this exist is due to all-too-common bad security testing practices, mistakes made in the rush to release or because programmers are unfairly expected to do double-duty as security experts. These mistakes include weak/default passwords, ports left open, permissions left undefined, an unprotected directory that anyone with a bit of knowledge can access and rewrite, and more. Online Cheating: While online games are fast becoming the most sought after applications on the Internet, cheating has emerged as a notable phenomenon in current game play. Online cheating is an important security issue that distinguishes online games from other E-commerce applications, though some cheats in online games may find similar exploits in other E-commerce applications. With advancement of newer technologies in online gaming approach newer cheating forms have been identified and our understanding about game cheating has also increased. Some of the newer techniques which have got special relevance to online games are as follows: a) Exploiting Misplaced Trust: Many cheats involve tampering with game code, configuration data, or both, on the client side. A cheater can modify his game client program, data, or both, and then replace the old copy with the revised one for future use. b) Collusion: People can agree with each other to gain unfair advantages over their honest opponents in online games. For example, the so-called “win-trading” was a collusion cheat widely seen in the popular StarCraft game, in which two cheaters colluded with each to lose to the other alternately in the ladder competition. c) Abusing the Game Procedure: This form of cheating may be carried out without any technical sophistication, and a cheater simply abuses the operating procedure of a game. One common case that we have observed in many online games is escaping: a cheater disconnects himself from the game system when he is going to lose. d) Related to Virtual Assets: Trading of virtual characters and items (e.g. clothing, weapons, homes and magical objects) acquired in games is a new and real business created by online games. Many players would like to have good characters, or improve the status of their own characters by getting some items in the game. Nonetheless, it is not easy for every player to get good characters and items, which require gaming skills and time. Where there is demand, there is supply, and then there is a market! Now virtual characters and items become virtual assets, or real assets in a virtual world, and many of them have been auctioned for real money on eBay. e) Exploiting Machine Intelligence: Artificial intelligence techniques can also be exploited by a cheating player in some online games. For example, the advancement of computer chess research has produced many programs that can compete with human players at the master level. When playing chess online, a cheater can look for the best candidates for his next move by stealthily running a strong computer chess program.
  • 4. f) Modifying Client Infrastructure: Without modifying game programs, configurations or data on the client side, a player can cheat by modifying the client infrastructure such as device drivers in his operating system. For example, he can modify a graphics driver to make a wall transparent so that he can see through the wall, locating other players who are supposed to be hidden behind the wall. g) Social Engineering: Social engineering is often used to steal passwords. There are many variations of this scam but all of them aim the same: to trick players to happily reveal their ID password pairs. Often these social engineers – password scammers – will attempt to trick a player into believing something attractive or annoying has happened to the player and his ID and password are needed for that purpose. They may approach a victim by phone, email, online chatting channels, or whatever they may exploit. h) Denying Service to Peer Players: A cheater can gain advantages by denying service to his peer players. For example, a cheater could delay the responses from his opponent by flooding his network connection. Other peer players would then be cheated into believing that there was something wrong with the network connection of the victim, and agree to kick him out from the game in order to avoid the game session being stalled. It’s clear that any business that hosts web applications like casual games needs to be super proactive about assuring the security of the site and the games they distribute. Beyond the devastating hacks that expose customers’ information and/or their computer systems, businesses also have to protect themselves from those who are looking to bypass payment systems and access content for free. Strong security is an essential part of doing business online, half-measures are a waste of time and budget. There’s no doubt that hackers will devote plenty of time and effort to find that one nasty little hole that exists in an otherwise pristine web portal. Fight Back What to do? Programming code reviews built into the development application security cycle are an obvious must. Risk-adjusted security processes that pinpoint areas of particular concern are helpful. Regular security self-assessments using an automated tool to scan the site infrastructure and its applications to spot problems -- hackers will be using their own scanning tools to spot exploitable issues on targeted websites -- is always a good thing, but there are many classes of highly exploitable vulnerabilities which automated tools cannot easily spot. And standard automated scanning tools can’t provide the essential complete picture either. In contrast, penetration tests look at a system or application exactly the way the most highly skilled malicious hackers do when they are looking for flaws to exploit, using procedures such as in-depth interactive testing to force error conditions and analysis of the data flow through an entire system to see how that data could be maliciously manipulated as it moves through applications. Application Penetration testing, such as those conducted on-demand by iViZ which are fine- tuned to spot exploitable flaws in web-based applications and their host sites, reveal the issues that exist in single applications, the problems that are created when applications interface with each other and the probable impact of each discovered flaw.
  • 5. Another critical defense method to keep in mind is that security at its best is always a dynamic process. Programming code changes, new vulnerabilities crop up, new ways of bypassing yesterday’s strong controls are constantly developed. The goal is to provide consistent protection against known, current and emerging threats. Effective security is not an item on a to- do list that can be completed, checked off, and never thought about again. It is and always will be an ongoing process, not a finite project. Periodic web application security assessment identifies potential vulnerabilities before they can cause damage and is a highly effective way to ensure that a happy casual game portal doesn’t become a dangerous playground for cybercriminals. Be cautious about the difference in Vulnerability assessment and penetration testing. Always insist for a penetration testing of your gaming application and not just vulnerability testing. Also do a thorough research on how to choose good penetration testing companies To read more about security of online travel portal visit blog. References: homepages.cs.ncl.ac.uk/jeff.yan/TEL.pdf http://www.gamecareerguide.com/education/theses/20050610/A%20Legal%20Perspective%20on%20C heating%20in%20Online%20Multiplayer%20Games.pdf www.ivizsecurity.com/blog/