Reports of a widespread hack affecting thousands of Activision player accounts surfaced on 20 September and were traced to a – now suspended – Twitter account that claimed the cyber attack was “worse than the notorious PS3 hack”, a reference to a 2011 incident. However, in a statement circulated by Activision’s support team on Twitter, the firm said this was not the case.
“Reports suggesting Activision Call of Duty accounts have been compromised are not accurate,” it said. “We investigate all privacy concerns. As always, we recommend that players take precaution [sic] to protect their Activision accounts, as well as any online accounts, at all times.
“You will receive emails when major changes are made to your Call of Duty accounts. If you did not make these changes, please be sure to follow the steps provided.”
Nevertheless, with login details for multiple jobs with computer science degree accounts allegedly being leaked and many players reporting their accounts inaccessible, it is clear that some kind of incident has taken place, most likely a credential stuffing attack.
Defined as the practice of using stolen credentials from one service to gain access to accounts on others where the same password has been used, credential stuffing attacks are easy pickings for cyber criminals as absent strict protective measures from the service provider thwarting them depends on the individual users’ security hygiene.
Accounts for media and entertainment services are known to be particularly vulnerable, and valuable, to cyber criminals – especially given the increased reliance on internet services during the Covid-19 pandemic – with credential stuffing attacks frequently affecting users of Amazon Video, Netflix and Disney+, to name but a few.
Comments
Post a Comment