View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 1, 2017updated 27 Jul 2022 4:58am

Cyber attack hits Xbox and Playstation, details of 2.5 million gamers hacked

“the fact that this breach remained undetected for almost a year and a half is alarming".

By Tom Ball

The personal details of 2.5 million Playstation and Xbox users have been leaked following a hack on forums XBOX360 ISO and PSP ISO.

The attack is thought to have actually taken place in September 2015, with disclosure of the hack only surfacing due, perhaps, to the original thieves having exhausted the use of the stolen data.

Gaming communities are a breeding ground for hackers, as often younger individuals find an interest in testing the boundaries of internet security by attempting to find loopholes for competitive gaming.

This most recent incident indicates a spike in the severity of cyber-attacks, with this instance involving significantly high figures. Highlighting the severity of this most recent incident is a 2014 cyber attack where hackers leaked the details of 13,000 Playstation users.

Hacker

The growing threat of cybercrime in the gaming world may be reflective of what is happening in the business world, as threats are becoming more formidable, sophisticated and numerable. A warning of this growing threat was given recently at the World Economic Forum in Davos, in which a cyber-storm was predicted.

Ollie Hart, Head of Enterprise & Cyber Security, UKI at Fujitsu said that “the fact that this breach remained undetected for almost a year and a half is alarming, and once again highlights the advanced methods hackers will use to steal sensitive data.”

The hackers responsible for the breach have not yet been identified, but users of the forums are being advised to change their passwords. With growing cyber-risk, prevention is a top priority.

Content from our partners
The growing cybersecurity threats facing retailers
How to integrate security into IT operations
How Kodak evolved to tackle seismic changes in the print industry and embrace digital revolution

Hart said that “attackers will always take the easiest route possible to breach a network and often seek to bypass perimeter controls via social engineering and phishing methods, so organisations must take the fight to cyber-criminals before they can act. Get on the front-foot, be proactive and get a layered defence in place that will enable real-time threat reporting and fast solutions before a threat becomes a compromise. Key to this is the use of threat intelligence and other information sources”.

Topics in this article: , , , ,
Websites in our network
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
I consent to New Statesman Media Group collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED
THANK YOU