• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
‘battle for the galaxy’ mobile game leaks 6m gamer profiles

‘Battle for the Galaxy’ Mobile Game Leaks 6M Gamer Profiles

You are here: Home / Latest Cyber Security Vulnerabilities / ‘Battle for the Galaxy’ Mobile Game Leaks 6M Gamer Profiles
June 3, 2021

Unprotected server exposes AMT Game titles user info made up of user email messages and order information and facts.

An Elasticsearch server keeping particular details of 6 million gamers of the preferred cellular recreation Fight for the Galaxy was learned insecure and made up of over 1 terabyte of unencrypted knowledge, indicating anyone with a backlink could access knowledge saved on the repository.

Ethical hackers WizCase found the details and speedily alerted AMT Online games, the publisher of Fight of the Galaxy, that the client knowledge was uncovered. In accordance to WizCase, AMT Online games has not responded to inquiries, but the leaky server is now safe.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Battle for the Galaxy is accessible for Android and iOS products, by using the Steam gaming platform and also through the activity publisher’s browser-primarily based variation of the activity. The game follows the open up planet structure, allowing gamers develop worlds and armies that can be directed to struggle other consumer armies.

A Galaxy of Open up Info

WizCase explained, in all 1.47 terabytes of facts was still left susceptible. The stockpile integrated 5.9 million participant profiles, 2 million transactions and 587,000 suggestions messages. Comments massages involved account IDs, email addresses, in-sport buy prices and payment companies. Pulled collectively, this database could deliver a rich established of data for cybercriminals to hone their phishing emails to make them look respectable, WizCase explained.

“For case in point, with the email addresses and certain details of consumer issues with the assistance this kind of as in transactions and developer messages could permit poor actors to pose as match help and immediate customers to malicious websites the place their credit history card details can be stolen,” WizCase explained.

“With facts on how a great deal money has been spent for each account, these conmen could target the highest-having to pay users, numerous of whom are kids judging by their match history, time put in in activity, circle of pals in-sport, and many others. and have an even greater chance of accomplishment than they would in any other case,” according to the WizCase report printed Wednesday.

Considerably less Than 1 % of Players Deliver 90 P.c of Earnings

Curiously, an investigation of Struggle for the Galaxy participant transaction knowledge by WizCase confirmed only .33 % of the people in the sample were being responsible for 90 percent of the income earned off all the full transactions. This little fraction of gamers accounting for most of the game’s company indicated to WizeCase that the video game is aggressively profiting on a minority of customers.

“While we are unable to remark on if Battle for the Galaxy specifically employs predatory small business procedures, these techniques, especially loot boxes, are prevalent in the bulk of free-to-play cell game titles as effectively as console/Personal computer online games, like Overwatch, League of Legends, and Fortnite. Fortnite’s procedures were being so egregious that its publisher, Epic Games, was sued in 2019 and settled by providing away 1,000 of its in-activity V-Bucks currency to claimants. Fortnite discontinued its loot box practices in 2019, revealing what buyers would be getting in the game’s Loot Llamas prior to order,” WizCase wrote.

Gamers Beware

Threatpost contacted AMT Video games and is ready for a reply concerning questions about the WizCase report and allegations. AMT Game titles Facebook webpage reported its improvement places of work are in Russia. WizCase discovered the company headquarters had been centered in China.

In April, Phone of Duty “War Zone” was utilised as cover for scammers peddling faux match cheats to deliver malware. Blockbuster activity Resident Evil experienced a big details breach in January of this calendar year, exposing the information of as numerous as 400,000 gamers. And of training course, the Cyberpunk 2077 release was plagued by attacks. Even the youngsters are beneath siege. Very last October, the video game Amid Us was temporarily shut down by an attacker named Eris Loris who spammed gamers till the sport was unplayable.

“We propose always inputting the bare least of facts when making a buy or location up an account on the internet,” WizCase advised. “The a lot less facts you give hackers to get the job done with, the a lot less vulnerable you are to attack.”

Be a part of Threatpost for “A Stroll On The Dark Facet: A Pipeline Cyber Disaster Simulation”– a Reside interactive demo on Wed, June 9 at 2:00 PM EDT. Sponsored by Immersive Labs, come across out no matter whether you have the resources and abilities to prevent a Colonial Pipeline-design and style attack on your organization. Thoughts and Dwell audience participation encouraged. Sign up for the discussion and Register HERE for no cost.


Some sections of this short article are sourced from:
threatpost.com

Previous Post: «post colonial and jbs, biden presses russia to stop harboring Post Colonial and JBS, Biden presses Russia to stop harboring ransomware gangs
Next Post: Self-service tool claims to execute cloud-based data access in five minutes self service tool claims to execute cloud based data access in five»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.