Diablo hacker springs reverse engineers

Powered by SC Magazine
 

“Why are you researching my trojan?”

A hacker has sprung AVG malware researchers midway through an analysis of a trojan crafted to trap Diablo gamers.

The researchers had discovered the malware on the Taiwan battle.net games forum and picked it apart to seek-out keylogging capabilities that would explain the recent theft of gamer data from Diablo III fans.

But during the analysis the Chinese hacker opened a chat window within the trojan, demanding to know what the researchers were doing.

“The dialog [is] an integrated function of the backdoor and the message is sent from the hacker who wrote the trojan. Amazing, isn’t it?,” the researchers wrote in a blog post.

“It seems that the hacker was online and he realised that we were debugging his baby.

“This is an impressive and first-time experience in my anti-virus career.”

Victims were directed to a booby-trapped video purporting to show how to farm the game’s boss character, Izual. The malware could display a victim’s screen and running processes and allow the mouse and camera to be hijacked

The hacker then terminated the malware instance.

Copyright © SC Magazine, Australia


Diablo hacker springs reverse engineers
 
 
 
Top Stories
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
Tracking the year of CIO churn
[Blog post] Who shone through in 12 months of disruption?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1088

Vote