Diablo hacker springs reverse engineers

Powered by SC Magazine
 

“Why are you researching my trojan?”

A hacker has sprung AVG malware researchers midway through an analysis of a trojan crafted to trap Diablo gamers.

The researchers had discovered the malware on the Taiwan battle.net games forum and picked it apart to seek-out keylogging capabilities that would explain the recent theft of gamer data from Diablo III fans.

But during the analysis the Chinese hacker opened a chat window within the trojan, demanding to know what the researchers were doing.

“The dialog [is] an integrated function of the backdoor and the message is sent from the hacker who wrote the trojan. Amazing, isn’t it?,” the researchers wrote in a blog post.

“It seems that the hacker was online and he realised that we were debugging his baby.

“This is an impressive and first-time experience in my anti-virus career.”

Victims were directed to a booby-trapped video purporting to show how to farm the game’s boss character, Izual. The malware could display a victim’s screen and running processes and allow the mouse and camera to be hijacked

The hacker then terminated the malware instance.

Copyright © SC Magazine, Australia


Diablo hacker springs reverse engineers
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1021

Vote