{"id":50900,"date":"2024-04-03T07:13:51","date_gmt":"2024-04-03T11:13:51","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=50900"},"modified":"2024-04-03T08:01:42","modified_gmt":"2024-04-03T12:01:42","slug":"hacker-attacks-apex-legends-global-series-tournament","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/50900\/","title":{"rendered":"Live hack: Apex Legends esports tournament scandal"},"content":{"rendered":"<p>The esports industry is booming: prize pools for top tournaments have long surpassed <a href=\"https:\/\/dota2.prizetrac.kr\/\" target=\"_blank\" rel=\"nofollow noopener\">$10 million<\/a>, with peak online viewership <a href=\"https:\/\/escharts.com\/top-games?order=peak\" target=\"_blank\" rel=\"nofollow noopener\">exceeding one million<\/a>. This naturally attracts hackers, who typically either <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/riot-games-receives-ransom-demand-from-hackers-refuses-to-pay\/\" target=\"_blank\" rel=\"nofollow noopener\">steal game source-code<\/a> or target individual gamers. Recently, cyberattacks have gone beyond the pale: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apex-legends-players-worried-about-rce-flaw-after-algs-hacks\/\" target=\"_blank\" rel=\"nofollow noopener\">hackers disrupted a major Apex Legends tournament<\/a>.<\/p>\n<p>This post explores why gamers need cybersecurity, and how they can get it.<\/p>\n<h2>What happened<\/h2>\n<p>During the final match of the North American leg of the Apex Legends Global Series (ALGS) tournament between the Dark Zero and Luminosity teams, a cheat configuration window suddenly popped up on a player\u2019s screen. The bewildered player also gained the ability to see in-game opponents through walls (\u201cwallhack\u201d) \u2014 a capital offense in competitive gaming, usually punishable by a multi-year or even lifetime ban. The player was disqualified, and their team received a technical defeat.<\/p>\n<div id=\"attachment_50905\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070821\/hacker-attacks-apex-legends-global-series-tournament-01.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50905\" class=\"size-full wp-image-50905\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070821\/hacker-attacks-apex-legends-global-series-tournament-01.jpg\" alt=\"Screenshot with cheat window from the match broadcast\" width=\"1600\" height=\"900\"><\/a><p id=\"caption-attachment-50905\" class=\"wp-caption-text\">Screenshot with cheat window from the match broadcast. <a href=\"https:\/\/clips.twitch.tv\/SparklingDarlingApeKlappa-iYd-e5Nns_gMcGuv\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The tournament organizers didn\u2019t adjust the rules or implement additional security measures on players\u2019 computers, leading to a repeat incident a few matches later: another pop-up cheat window, wallhack, and even aimbot functionality this time. At this point, the organizers suspected something was up: cheaters can indeed be found in esports, but brazenly opening a cheat window mid-game seemed beyond belief. The match was stopped, and the tournament postponed indefinitely.<\/p>\n<p>Shortly after, a user nicknamed Destroyer2009 <a href=\"https:\/\/twitter.com\/AntiCheatPD\/status\/1769532511057584576\" target=\"_blank\" rel=\"nofollow noopener\">claimed responsibility on social media<\/a>, stating they exploited a <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-code-execution-rce\/\" target=\"_blank\" rel=\"noopener\">remote code execution vulnerability<\/a>. However, the supposed culprit didn\u2019t specify where the vulnerability resided: in Apex Legends itself, the Easy Anti-Cheat software mandatory for esports tournaments, or another program. Easy Anti-Cheat representatives declared their software secure. Gamers worldwide await a similar statement from Respawn Entertainment \u2014 Apex Legends\u2019 developers \u2014 but so far there\u2019s been no word; however, Respawn did announce that it has already <a href=\"https:\/\/twitter.com\/Respawn\/status\/1770285073688137762\" target=\"_blank\" rel=\"nofollow noopener\">released<\/a> the first in a series of security updates.<\/p>\n<p>This case is unprecedented in esports. Internet issues? Sure. Hardware problems? Those happen too. But never before has a tournament been interrupted and postponed due to hackers.<\/p>\n<h2>Esports needs protection<\/h2>\n<p>Of course, it\u2019s premature to draw conclusions before the investigation concludes: the tactics and methods used by the attackers, the vulnerability exploited, and the software at fault all remain unknown. However, it\u2019s likely that the Apex Legends players\u2019 computers lacked <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">robust protection<\/a>, which could also have prevented other embarrassing situations in esports. For example, in the summer of 2023 during the Bali Major 2023 Dota 2 tournament, Russian player Ivan \u201cPure\u201d Moskalenko found himself at the center of a <a href=\"https:\/\/www.forbes.com\/sites\/mikestubbs\/2023\/07\/06\/betboom-handed-loss-after-player-caught-watching-stream-during-dota-2-match\/\" target=\"_blank\" rel=\"nofollow noopener\">controversy<\/a>. Mid-match, Ivan accessed his own game\u2019s Twitch stream, potentially gaining an advantage as the stream displayed both teams\u2019 positions. Tournament organizers weren\u2019t pleased, <a href=\"https:\/\/esports.gg\/news\/dota-2\/betboom-loss-bali-major-pure\/\" target=\"_blank\" rel=\"nofollow noopener\">disqualifying the gamer and handing his team a technical defeat<\/a>.<\/p>\n<div id=\"attachment_50904\" style=\"width: 1282px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070646\/hacker-attacks-apex-legends-global-series-tournament-02.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50904\" class=\"size-full wp-image-50904\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070646\/hacker-attacks-apex-legends-global-series-tournament-02.jpg\" alt=\"Pure opened up a Twitch stream of his own game during an official match\" width=\"1272\" height=\"758\"><\/a><p id=\"caption-attachment-50904\" class=\"wp-caption-text\">Pure opened up a Twitch stream of his own game during an official match. <a href=\"https:\/\/twitter.com\/esports\/status\/1676882559198740481\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The <a href=\"https:\/\/docs.google.com\/document\/d\/1m_ltQzWjMflEWfWmbou14TfEDSF95V6FJva58J5ulfA\/edit\" target=\"_blank\" rel=\"nofollow noopener\">tournament rules<\/a> stipulated restricted internet access from gaming terminals during matches: only Steam, Dota 2, and TeamSpeak were allowed. But simply blocking specific websites \u2014 or all extraneous resources altogether \u2014 could have been achieved with security solutions.<\/p>\n<h2>Nuances of protecting esports players<\/h2>\n<p>Gamers often consciously reject cybersecurity, guided by the outdated belief that \u201cantiviruses slow games down\u201d. But the reality today is that this isn\u2019t the case: <a href=\"https:\/\/www.kaspersky.com\/blog\/tests-gamers-antiviruses\/47576\/\" target=\"_blank\" rel=\"noopener nofollow\">tests<\/a> show that <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">protection<\/a>\u00a0has no impact on gameplay whatsoever.<\/p>\n<p>Skeptics also like to cite instances where annoying antivirus notifications popped up on the screen at crucial moments during games. <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Our products<\/a>\u00a0offer a special <a href=\"https:\/\/support.kaspersky.com\/help\/Kaspersky\/Win21.15\/en-US\/70774.htm\" target=\"_blank\" rel=\"noopener\">gaming mode<\/a>, which activates automatically when games (and some other applications in fullscreen mode) are launched, pausing anti-virus database updates, notifications, and scheduled computer scans. Your computer remains protected \u2014 even during the most intense esports matches, while <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a>\u00a0works in the background.<\/p>\n<p>Though it\u2019s not known for certain where exactly the RCE vulnerability used by the hacker during the ALGS tournament is hidden, we recommend that all fans of this game install reliable <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">gaming protection<\/a>\u00a0on their combat computers.<\/p>\n<div id=\"attachment_50903\" style=\"width: 1251px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070600\/hacker-attacks-apex-legends-global-series-tournament-03.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-50903\" class=\"size-full wp-image-50903\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/04\/03070600\/hacker-attacks-apex-legends-global-series-tournament-03.png\" alt=\"Kaspersky VPN Secure Connection protects gamers' privacy while maintaining a stable, blazing-fast and secure connection with minimal latency\" width=\"1241\" height=\"851\"><\/a><p id=\"caption-attachment-50903\" class=\"wp-caption-text\">Kaspersky VPN Secure Connection protects gamers\u2019 privacy while maintaining a stable, blazing-fast and secure connection with minimal latency<\/p><\/div>\n<p>And to protect your privacy while gaming, use <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">our ultra-fast VPN<\/a> \u2014 either standalone or included with a <a href=\"https:\/\/www.kaspersky.com\/lp\/special-offer-for-gamers?icid=gl_bb2023-kdplacehd_acq_ona_smm__all_b2c_blo_lnk____kprem___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Premium<\/a> subscription. Special VPN servers in a separate \u201cGaming\u201d locations list use the optimized Catapult Hydra protocol to reduce latency, which is crucial because the lower it is, the better the gaming experience.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-gamer\">\n","protected":false},"excerpt":{"rendered":"<p>Hackers have long been engaging with the gaming world: from cracking games and creating cheats, to, more recently, attacking esports players live during an Apex Legends tournament. Regarding the latter, we break down what happened and how it could have been avoided.<\/p>\n","protected":false},"author":2754,"featured_media":50901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683,9],"tags":[647,899],"class_list":{"0":"post-50900","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-gamers","10":"tag-hack"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/50900\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacker-attacks-apex-legends-global-series-tournament\/27280\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/22571\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/29939\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacker-attacks-apex-legends-global-series-tournament\/27437\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacker-attacks-apex-legends-global-series-tournament\/27150\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacker-attacks-apex-legends-global-series-tournament\/29835\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacker-attacks-apex-legends-global-series-tournament\/28656\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacker-attacks-apex-legends-global-series-tournament\/37236\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hacker-attacks-apex-legends-global-series-tournament\/21680\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacker-attacks-apex-legends-global-series-tournament\/22383\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacker-attacks-apex-legends-global-series-tournament\/31169\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacker-attacks-apex-legends-global-series-tournament\/36174\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hacker-attacks-apex-legends-global-series-tournament\/27599\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacker-attacks-apex-legends-global-series-tournament\/33444\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacker-attacks-apex-legends-global-series-tournament\/33071\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/gamers\/","name":"gamers"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2754"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=50900"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50900\/revisions"}],"predecessor-version":[{"id":50908,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/50900\/revisions\/50908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/50901"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=50900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=50900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=50900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}