{"id":3552,"date":"2014-01-23T10:03:05","date_gmt":"2014-01-23T15:03:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=3552"},"modified":"2020-02-26T10:46:52","modified_gmt":"2020-02-26T15:46:52","slug":"gaming-console-hacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/gaming-console-hacks\/3552\/","title":{"rendered":"Gaming Console Hacks"},"content":{"rendered":"<p>For as long as I\u2019ve been working in the security industry, which \u2013 in the spirit of full disclosure \u2013 hasn\u2019t been a very long time, I have been shocked by the utter lack of attacks targeting gaming systems.<\/p>\n<p>A couple times a year, maybe, you\u2019ll read about an attack targeting or a vulnerability in <a href=\"https:\/\/threatpost.com\/trouble-borderlands-2-players-103012\/77166\" target=\"_blank\" rel=\"noopener nofollow\">some specific game<\/a> or gaming platform. More often than not the attacks are one-offs, generally exploiting a game\u2019s online platform, <a href=\"https:\/\/threatpost.com\/ubisoft-urges-password-changes-following-hack\/101165\" target=\"_blank\" rel=\"noopener nofollow\">forum<\/a>, or <a href=\"https:\/\/threatpost.com\/hackers-compromise-war-z-forum-game-databases-040313\/77693\" target=\"_blank\" rel=\"noopener nofollow\">database<\/a> of some kind. The forever-popular first person PC shooter, CounterStrike, is a great example of this: there always seem to be CounterStrike hacks out there.<\/p>\n<p>To be clear, PC and other computer gamers, particularly those playing massively multiplayer online role-playing and other popular games (like Minecraft), <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792287\/Winnti_More_than_just_a_game\" target=\"_blank\" rel=\"noopener nofollow\">are already exposed to significant threats targeting their machines<\/a>. Attacks targeting the XBOX or PlayStation or Nintendo consoles, however, seem to be incredibly rare. Nintendo\u2019s and Sony\u2019s portable DS and PSP offerings were <a href=\"http:\/\/www.securelist.com\/en\/blog\/171914589\/Gaming_systems_targeted_yet_again\" target=\"_blank\" rel=\"noopener nofollow\">targeted by trojans some six years ago<\/a>, and experts have prophesied the dawn of gaming malware for just as many years. The reality though, by nearly any measure, is that yearly gaming malware predictions have yet to materialize.<\/p>\n<div class=\"pullquote\">The PlayStation Network attack and subsequent outage in 2011 was among the largest known data breaches to date, affecting somewhere between 75 and 100 million customers.<\/div>\n<p><a href=\"https:\/\/threatpost.com\/sony-fined-250000-uk-over-failures-playstation-network-breach-012413\/77446\" target=\"_blank\" rel=\"noopener nofollow\">The PlayStation Network attack and subsequent outage in 2011<\/a> was among the largest known data breaches to date, affecting somewhere between 75 and 100 million customers. The network outage lasted nearly a month, and Sony (the company that makes the PlayStation) was harshly criticized for it, not only because of the way they handled the outage but also because of the series of security missteps that led to and in some cases worsened the severity of the breach. Notorious though the incident was, the attack targeted corporate servers rather than the console itself.<\/p>\n<p>Of course, the PSN attack was \u2013 at least in part \u2013 a reaction to the way that Sony itself reacted when George Hotz, perhaps better known by the handle geohot, announced that he had Jailbroken \u2013 or unlocked \u2013 the PlayStation 3. In fact, it is important to draw a line here, when I say attacks, I am referring to malicious, criminal hacks seeking to steal money, information, or computer resources from gaming consoles which are increasingly computer-like. There has certainly been no shortage of hobbyist hacks, sometimes known as modding, seeking to access the full potential of gaming consoles or to make them capable of playing illegally downloaded content.<\/p>\n<p>If you think back to\u00a0 early gaming consoles, this sort of behavior was almost encouraged in a way. When I was maybe five or six, my dad came home with this strange device called Game Genie for my Nintendo Entertainment System. For all intents and purposes, the Game Genie was an automated hacking box. It accessed the binary code that controlled the video games, manipulated that game data, and let game-players enter cheat-codes and perform unintended functions during game-play.<\/p>\n<p>Now however, as consoles become more powerful and connected, the threat of malware targeting gaming consoles is becoming increasingly real. <a href=\"http:\/\/www.securelist.com\/en\/blog\/208214184\/Gaming_the_security_The_new_generation_of_consoles\" target=\"_blank\" rel=\"noopener nofollow\">In words of my colleague<\/a>, Kaspersky Lab expert Christian Funk, \u201cthe high interconnectivity of modern consoles, like apps for Twitter, Facebook, Youtube, chat tools and video conferencing like Skype opens doors and makes them more vulnerable to attacks.\u201d<\/p>\n<p>The hard reality here is that the more we input valuable information into a machine, the more likely that machine is to be targeted by attackers seeking to acquire that valuable information.<\/p>\n<p>On that note, in a pre-Christmas Securelist article addressing the arrival of the newest XBOX One and PS4 gaming consoles, Funk assessed the contributing factors leading to the level of risk these devices face from malware attacks. He claims the two most important factors are the popularity of a device and the ability to make money attacking it.<\/p>\n<p>In the case of the XBOX One, Funk is interested in its compatibility with Windows Phone applications. Currently, he claims, there is no in-the-wild malware targeting Windows Phone applications, likely because of it\u2019s lack of market-share. The XBOX One bump may substantially increase the number of users that interact with Windows Phone and its exposure to threats in turn.<\/p>\n<p>Financially, Funk reasons there is plenty of incentive for attackers. Despite this, he\u2019s only seen bricking malware as of yet. And bricking malware, which essentially breaks the machine it targets, while unfortunate and malicious, isn\u2019t making anyone money. Not yet at least. In that vein, Funk says he has read of certain hacks claiming to make the XBOX One reverse compatible with XBOX 360 games but actually just breaking the console by messing with the devkit. This is troll behavior at worst.<\/p>\n<p>\u201cHowever, with modern consoles,\u201d Funk writes, \u201cthings are a bit different. Since the makers of devices are increasingly including the possibility to install additional applications (and pay for them via credit cards, saved on your gaming account) and social media interconnectivity to share the progress and achievements in a game for a \u2018fuller gaming experience\u2019, as well as offering decent hardware performance, consoles are in fact attractive for criminals.\u201d<\/p>\n<p>Funk goes on to express concern regarding potential <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-cyber-extortion\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> scams that would lock down a console and demand payment to unlock it. Information, credit card, or credential-stealing trojans could also be a problem for gamers on the latest generation of consoles as well. Beyond these, given the increase in computing power built into these new machines, Funk notes that they may be valuable targets for criminals seeking to amass processing power to mine Bitcoins or perhaps operate botnets as well.<\/p>\n<p>As Funk notes in his piece, we aren\u2019t trying to scare anyone off the latest and greatest consoles. I am sure they are a blast and that they\u2019ll bring you far more joy than grief. However, I also have a bad feeling that the time for gaming malware is now, and I am not totally sure what it will take to protect ourselves. It\u2019s entirely possible that gaming malware predictions never come to fruition or that the console makers or even security companies get smart about console security and gamer protection. It\u2019s also possible that attackers will start going after gaming consoles like Windows machines in the mid-2000s or Android now. Only time will tell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For as long as I\u2019ve been working in the security industry, which \u2013 in the spirit of full disclosure \u2013 hasn\u2019t been a very long time, I have been shocked<\/p>\n","protected":false},"author":42,"featured_media":3553,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[647,527],"class_list":{"0":"post-3552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-gamers","9":"tag-hacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gaming-console-hacks\/3552\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gaming-console-hacks\/2835\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gaming-console-hacks\/2730\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gaming-console-hacks\/3066\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gaming-console-hacks\/2946\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gaming-console-hacks\/2429\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gaming-console-hacks\/3552\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gaming-console-hacks\/3552\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3552"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3552\/revisions"}],"predecessor-version":[{"id":33018,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3552\/revisions\/33018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3553"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}