Diablo hacker springs reverse engineers

Powered by SC Magazine
 

“Why are you researching my trojan?”

A hacker has sprung AVG malware researchers midway through an analysis of a trojan crafted to trap Diablo gamers.

The researchers had discovered the malware on the Taiwan battle.net games forum and picked it apart to seek-out keylogging capabilities that would explain the recent theft of gamer data from Diablo III fans.

But during the analysis the Chinese hacker opened a chat window within the trojan, demanding to know what the researchers were doing.

“The dialog [is] an integrated function of the backdoor and the message is sent from the hacker who wrote the trojan. Amazing, isn’t it?,” the researchers wrote in a blog post.

“It seems that the hacker was online and he realised that we were debugging his baby.

“This is an impressive and first-time experience in my anti-virus career.”

Victims were directed to a booby-trapped video purporting to show how to farm the game’s boss character, Izual. The malware could display a victim’s screen and running processes and allow the mouse and camera to be hijacked

The hacker then terminated the malware instance.

Copyright © SC Magazine, Australia


Diablo hacker springs reverse engineers
 
 
 
Top Stories
Slow progress in Turnbullistan
[Blog post] How has the NBN moved ahead since regime change?
 
Hacks and frauds can't dampen Bitcoin buzz
[Blog post] Enthusiasts meet in Melbourne.
 
Qantas checks in with cloud computing
Impressed with results of public cloud bake-off.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  22%
 
Application integration concerns
  3%
 
Security and compliance concerns
  30%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  25%
 
Lack of stakeholder support
  4%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 535

Vote