View all newsletters
Receive our newsletter - data, insights and analysis delivered to you

Home Office flags game modification as cybercrime sign

Those who tinker with video games could turn out as hackers, says report.

By Jimmy Nicholls

Gamers experimenting with modifications to video games are being flagged by the Home Office as potential cybercriminals, a report released on Tuesday reveals.

The document attempts to highlight signs that a person is at risk of becoming involved in serious organised crime, with technological skills now considered an important factor.

"Some individuals have specialist knowledge and skills in IT and communications which can enable them to commit serious offences," the Home Office report said.

"Early behaviours could include modifications to games or software and sharing online. Recent evidence suggests that the number of frauds committed by young adults are increasing.

Tampering with video game code to extend or alter the playing experience is a popular hobby among gamers, with many games having large communities built around building and playing such "mods".

Changes to games can range from minor to comprehensive, with some modders being well versed in programming, which may have utility in cybercrime, as well as other unapplicable skills such the use of 3D modelling tools.

"Cybercriminals will likely have had some formal IT training, with computer graduates being lured into cybercrime," the report added. "Although some will have learned the skills themselves or through online communities."

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Hacker communities often bear a resemblance to gaming communities, often being frequented by young men whose conversations can be puerile and profane in equal measure.

Such platforms often allow would-be hackers to swap tips on vulnerabilities and attack methods, as well as sell each other software that automates certain aspects of cybercrime.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU