{"id":4474,"date":"2020-03-20T10:00:30","date_gmt":"2020-03-20T14:00:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=4474"},"modified":"2020-05-18T08:23:50","modified_gmt":"2020-05-18T12:23:50","slug":"online-gamer-threats","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/online-gamer-threats\/4474\/","title":{"rendered":"Top 5 threats for online gamers"},"content":{"rendered":"<p>Not so long ago, most people regarded gaming as something for kids and maybe teens, nothing adults really needed to worry about. We\u2019re not sure precisely when that changed, but with gaming now reputable and ubiquitous, we all have a new front to guard against cybercriminals.<\/p>\n<p>The chances are good that you play an online game \u2014 or more than one \u2014 at least occasionally. Whether you use a gaming console, a PC, or your phone, whether you play 10 minutes while commuting or every spare evening and weekend hour is not important. If you play, then you need to know and avert the risks associated with your gaming online.<\/p>\n<p>Specific game exploits and hacks of game developers crop up from time to time, but cheating and other common issues affecting online gaming persist. Here are the five major risks threatening everyone involved in online gaming, and what you can do to stay safe:<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-gaming\">\n<h2>1. Phishing<\/h2>\n<p>The same tactics scammers use to trick people out of their credit card numbers, bank passwords, and other account logins are also popular with gaming thieves. In this case, instead of mocking up a replica of Chase Bank or the like, criminals may build something that looks like a popular online game website and urge gamers to change their password or validate their account, typically threatening to block the gamer\u2019s account unless they comply. The goal is to take over the account and resell it on the black market.<\/p>\n<p><strong>Solution:<\/strong> Phishing is phishing. Never click a link in an e-mail or text message. Open your Web browser, type in the game website yourself, log in to your account, and perform any checks or confirmations there. Use <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">online protection<\/a> that prevents your browser from opening\u00a0fake sites.<\/p>\n<h2>2. Trolls and bullying<\/h2>\n<p>Almost every online game includes some form of voice or text-based chatting nowadays. Unfortunately, the feature is also widely abused. In the heat of the online battle, you may hear some cursing, or an insult. That may just be human nature in a highly competitive atmosphere, but inevitably, some players will cross the line into bullying other players. And in some games, especially those dedicated to online characters\u2019 virtual lives, such chats may become uncomfortably personal.<\/p>\n<p><strong>Solution:<\/strong>\u00a0Immediately block any offender; don\u2019t play or chat with them, and report their user name to the game abuse team. Never reveal your real identity or personal details to your gaming partners. If your kids are playing, teach them to discuss such incidents with you promptly and make sure they are well aware that the \u201cstranger-danger\u201d principle is highly applicable in online games as well as in the real world.<\/p>\n<h2>3. Cheats and frauds<\/h2>\n<p>Depending on the rules and the type of game, multiple ways to cheat may exist \u2014 some considered legitimate, some not. The worst use modified gaming clients, or even bots, to play in better condition (with greater speed or precision, for example) than ordinary players. Also, some players take advantage of errors they discover in the game server\u2019s code to gain an advantage in-game.<\/p>\n<p>Other ways to cheat involve fixing games, using virtual gangs to rob novice players, and virtual fraud. When it comes to in-game economies, centuries-old fraud schemes sometimes arise. You may encounter a person offering you some inventory or an in-game advantage for a discounted price, for example, but typically such offers turn out to be scams.<\/p>\n<blockquote><p>Trading in-game goods outside of the official game marketplace dramatically increases your chances of being deceived.<\/p><\/blockquote>\n<p><strong>Solution:<\/strong>\u00a0 Don\u2019t accept suspicious offers from strangers. If an offer sounds too good to be true, it probably is. If you notice someone progressing too fast in the game, report it to the support team. Most online games have strict regulations and promptly ban cheaters.<\/p>\n<h2>4. Character and inventory theft<\/h2>\n<p>Criminals are likely to target in-game resources, well-developed game characters, paid game accounts, or associated credit-card data. The latter is the hardest to target, but others may be stolen from you in multiple ways: phishing, password-stealing malware, in-game fraud and so on. Ultimately, the better your character or account, the greater the chance that criminals will target you specifically. This is especially relevant for well-developed games with large, loyal (and paying) audiences worldwide.<\/p>\n<p><strong>Solution:<\/strong> As you progress in a game, be more and more cautious with your account. Set up two-factor authentication for the account, use complex and unique passwords for your in-game account and your primary e-mail address, use a <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">strong security solution<\/a> for your device, and watch out for phishing and other attempts to steal your credentials.<\/p>\n<blockquote><p>The better your in-game character, the more likely criminals are to target you personally.<\/p><\/blockquote>\n<h2>5. Computer or smartphone compromise<\/h2>\n<p>In addition to other tricks that work for a general audience, some hackers target gamers with fake game updates or utilities claiming to customize your game or help speed your game progress. Malicious apps spread through phishing, in-game communications, as attachments on gamers\u2019 forums or chat rooms, and by other, similar means.<\/p>\n<p>In some exceptional cases, malware is even spread through legitimate game update mechanisms. Some of that malware is game-oriented, stealing gamers\u2019 credentials or in-game goods, but some steals bank accounts; adds your PC, Mac, or smartphone to a botnet; or mines Bitcoins.<\/p>\n<p><strong>Solution:<\/strong> The aforementioned malware is why gamers always need fully updated devices with the most recent patches from OS vendors and the strongest Internet security suite available. Some solutions, such as <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>, protect you from malware and phishing and also include a special gaming mode, which delays or disables certain features so your security won\u2019t cause any computer slowdowns while you\u2019re kicking butt online.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-gaming\">\n","protected":false},"excerpt":{"rendered":"<p>Be it Fortnite, League of Legends, or good old Archero, risks abound for online gaming. Learn about the threats so you can avoid them.<\/p>\n","protected":false},"author":32,"featured_media":34194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[604,647,76,726,97,422,131],"class_list":{"0":"post-4474","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-bullying","10":"tag-gamers","11":"tag-phishing","12":"tag-scam","13":"tag-security-2","14":"tag-threats","15":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/online-gamer-threats\/4474\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/online-gamer-threats\/3325\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/online-gamer-threats\/3205\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/online-gamer-threats\/3626\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/online-gamer-threats\/3668\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/online-gamer-threats\/3684\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/online-gamer-threats\/7977\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/online-gamer-threats\/11306\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/online-gamer-threats\/3299\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/online-gamer-threats\/3684\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/online-gamer-threats\/4474\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/online-gamer-threats\/4474\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4474"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4474\/revisions"}],"predecessor-version":[{"id":35536,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4474\/revisions\/35536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/34194"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}