Logo

    115: Player Cheater Developer Spy

    en-usApril 19, 2022
    What is r00tz at the Defcon conference?
    How did the 10-year-old girl hack her game?
    Why did Jack struggle to get interviews in the game-cheating community?
    What methods are game developers using against cheat-makers?
    What risks are associated with purchasing cheats from shady websites?

    Podcast Summary

    • Children and Adults Alike Learn Hacking at Defcon ConferenceHacking is not limited to adults, as children too are learning it. Additionally, cheating in video games is a well-known and thriving industry, but those involved in it are not willing to speak out.

      The annual hacker conference, Defcon, has a village for kids called r00tz where they learn how to hack. A 10-year-old girl gave a talk about how she hacked a farming game on her phone by turning off Wi-Fi and changing the clock to get her crops to grow instantly. In another incident, Jack stumbled upon people cheating in video games, which is a well-known fact, but he found that it was a crazy industry. He tried embedding himself in the game-cheating community but failed to get any voice interviews. He chatted with developers, distributors, admins, and players who are open to anything but didn't want to be heard. Jack had to settle for a voice actor to read out the chat messages.

    • The Lucrative Industry of Online Gaming CheatsCheating in online games has become a profitable industry with developers earning thousands of dollars a month and resellers making good money. However, game developers are constantly working towards securing their games to prevent cheats.

      Cheating in online games is a lucrative industry that involves developers selling cheat keys to resellers who then sell them to players. Developers can earn anywhere from a few bucks to $500,000 a month by creating cheats. Since game developers patch games frequently, cheat keys must be constantly updated, which requires a significant amount of money. Besides the developers, resellers also make good money from selling cheat keys. Before someone can buy a cheat key, they must be verified by providing their personal information and a selfie to protect the cheat from theft or competitors. Game developers like Techland are constantly working on ways to secure their games and prevent cheats.

    • The Battle Against Cheating in Online GamesGame developers invest heavily in preventing cheating in online games through anti-cheat engines and software, dedicated teams, and constant monitoring. The prevalence of cheating has given rise to the emergence of a secondary industry of anti-cheat software solutions.

      Cheating in online games is gaining an unfair advantage by exploiting glitches or using automation, which ruins the experience for other players. Game developers take cheating seriously and invest a considerable amount of resources to detect and stop cheaters, including creating their own anti-cheat engines and integrating external anti-cheat software like BattlEye, PunkBuster, Easy Anti-Cheat, and VAC. A dedicated team of game developers works on finding and fixing cheats, and larger games like League of Legends have a team of around 25 people dedicated to this task. Anti-cheat software solutions like BattlEye analyze player behavior, detect cheats, and report them to game developers for further action. This secondary offshoot industry of anti-cheat software solutions has emerged because of the prevalence of cheaters in video games.

    • The Battle Between Game Developers and Cheat-MakersCheat-makers constantly try to evade detection while developers struggle to prevent cheating. Buying cheats is easy, but private ones require elaborate processes. Even developers have to be careful when dealing with cheat-makers.

      The game-cheating industry is a serious problem for game developers who are trying to provide players with a fun experience without cheaters. BattlEye is trying to ruin the cheating industry, while cheat-makers are constantly developing new strategies to evade detection. The cheat-makers and game developers are enemies, and the cheat-makers are sometimes attacked by competitors and other haters. They even have to spend money on DDoS prevention when attacked. The process of buying public cheats is easy, while the private ones require posing as different users, using multiple accounts and separate networks. It's a delicate process that even game developers have to be careful about, as the cheat-makers are watching. Cheats come with a loader that is a wrapper for the game, and all packets come in and out through it.

    • The Risks of Purchasing Video Game Cheats from Shady WebsitesBuying cheats from illegitimate sources can compromise your personal data and lead to bans from the game. Developers take extreme precautions to ensure cheat safety and offer some voluntarily through bug bounty programs.

      Purchasing video game cheats from shady websites is a risk that involves giving personal data and downloading malware. Developers go to extreme precautions to analyze cheats on a separate network to avoid malware or spyware. Cheats from dodgy websites can be tied to machine IDs and collect sensitive information from the computer like login credentials, IP address or Mac ID. Buying a cheat that is not undetectable can lead to getting banned from the game. Game developers put cheats on a separate network, a virtual machine or analyze it through Remote Desktop, making it hard to share with others. Some cheats are offered voluntarily through a bug bounty program.

    • The High-Stakes Battle Between Game Developers and Cheat ProvidersCheating in the gaming industry is a cutthroat business, with personal attacks and emotional tolls on both sides. Developers must safeguard their personal information in the face of potential retaliation.

      The gaming industry is highly competitive and sometimes cheats are sold by one cheat provider to a developer to ruin the business of another cheat provider. Developers sometimes need to pose as double agents, acting like a cheater to get their hands on some cheats. Cheating can be a personal process that takes a lot of time and effort, which is why cheat developers might feel emotional after creating a cheat. However, when the cheat gets exposed, it can lead to personal attacks on developers, including doxxing, weird messages and threats. Being more secure about social media is necessary. The battle between game developers and cheat developers is a high stakes game that gets personal.

    • The serious consequences of cheating in video gamesCheating gives unfair advantage, damages reputation, and can lead to legal consequences. Cheaters in tournaments risk cash prizes and harm the game's integrity. Even young gamers aren't immune from lawsuits.

      Cheating in video games has serious consequences and can lead to legal consequences and loss of reputation. Cheating may not be visible to everyone, especially in cases of streaming, but it gives an unfair advantage to players, making them look better than they actually are. Cheating in tournaments can lead to cash prize wins, but can also reflect badly on the game and lead to legal action from game developers. Several cheat developers have been caught and sued, with some being teenagers, and luxury cars have been seized from some of the biggest cheat operations in the world. In 2019, even a fifteen-year-old YouTuber was sued by Epic Games for advertising cheats on his channel.

    • The Never-Ending Battle Against Cheat-Makers in Video GamesWhile game developers struggle to stop cheat-makers, focusing on securing game code and adding monitoring mechanisms seems to be the best approach. The battle against cheat-makers is ongoing, as they constantly find ways to evade detection.

      Game developers are struggling to stop cheat-makers who infringe on intellectual property rights. Despite issuing cease and desist letters, many cheat-makers continue to produce cheats, and locating them and issuing lawsuits is difficult. Game studios are using high-priced lawyers to intimidate cheat-makers and threaten them with lawsuits, but this approach may not always work. Corporations have been known to bully people with lawsuits in the past, often with devastating results. The best approach for game-makers currently seems to be focusing on securing game code and client and adding monitoring and detection mechanisms to find cheaters and force them to quit. However, cheat-makers are also constantly working to evade detection, making this a never-ending battle.

    Recent Episodes from Darknet Diaries

    149: Mini-Stories: Vol 3

    149: Mini-Stories: Vol 3

    In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    Darknet Diaries
    en-usSeptember 03, 2024

    148: Dubsnatch

    148: Dubsnatch

    Ever wondered how far a fan would go to get a sneak peek of their favorite artist’s unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.


    Darknet Diaries
    en-usAugust 06, 2024

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices