View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 1, 2017updated 27 Jul 2022 4:58am

Cyber attack hits Xbox and Playstation, details of 2.5 million gamers hacked

“the fact that this breach remained undetected for almost a year and a half is alarming".

By Tom Ball

The personal details of 2.5 million Playstation and Xbox users have been leaked following a hack on forums XBOX360 ISO and PSP ISO.

The attack is thought to have actually taken place in September 2015, with disclosure of the hack only surfacing due, perhaps, to the original thieves having exhausted the use of the stolen data.

Gaming communities are a breeding ground for hackers, as often younger individuals find an interest in testing the boundaries of internet security by attempting to find loopholes for competitive gaming.

This most recent incident indicates a spike in the severity of cyber-attacks, with this instance involving significantly high figures. Highlighting the severity of this most recent incident is a 2014 cyber attack where hackers leaked the details of 13,000 Playstation users.

Hacker

The growing threat of cybercrime in the gaming world may be reflective of what is happening in the business world, as threats are becoming more formidable, sophisticated and numerable. A warning of this growing threat was given recently at the World Economic Forum in Davos, in which a cyber-storm was predicted.

Ollie Hart, Head of Enterprise & Cyber Security, UKI at Fujitsu said that “the fact that this breach remained undetected for almost a year and a half is alarming, and once again highlights the advanced methods hackers will use to steal sensitive data.”

The hackers responsible for the breach have not yet been identified, but users of the forums are being advised to change their passwords. With growing cyber-risk, prevention is a top priority.

Content from our partners
Sherif Tawfik: The Middle East and Africa are ready to lead on the climate
What to look for in a modern ERP system
How tech leaders can keep energy costs down and meet efficiency goals

Hart said that “attackers will always take the easiest route possible to breach a network and often seek to bypass perimeter controls via social engineering and phishing methods, so organisations must take the fight to cyber-criminals before they can act. Get on the front-foot, be proactive and get a layered defence in place that will enable real-time threat reporting and fast solutions before a threat becomes a compromise. Key to this is the use of threat intelligence and other information sources”.

Topics in this article : , , , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU