The proliferation of in-game microtransactions has increased the risk of targeted threat activity for the gaming industry. High-value gaming accounts have become high-profile threat targets in a hyperconnected collaborative ecosystem. Gaming organizations should consider upgrading their cybersecurity posture to improve consumer trust and to protect both reputation and revenue. Beyond potential intellectual property (IP) and outage-based revenue losses, gaming organizations should consider the potential impact of threats to their gamers. This means attacks such as account takeover (ATO) pose a real threat to destroying consumer trust, affecting both the consumer and the organization. Gamers’ demand for heightened security controls to protect not only their data but also their accounts is likely going to grow as both become more valuable. What can gaming organizations learn from institutions that have dealt with fraud for years to help protect gamer accounts and data?
With the expectation of continued growth in the microtransaction market over the next few years,1 it is possible to anticipate an influx of threat actors targeting gamers. ATO attacks introduce fraud risk by creating an opportunity for an unauthorized party to initiate payments or inappropriately transfer virtual currencies and/or goods from a compromised user account. Unauthorized in-game reward redemptions and other promotion fraud could also stem from compromised user credentials. These redemptions appear to come from an authorized party, yet the fraud results in potentially large financial losses for customers.
Through credential stuffing techniques, cybercriminals leverage compromised credentials and bots to breach individual user accounts across social media, email, and financial institutions. These techniques are predicated on the cybercriminals’ hope that people reuse passwords. Many large gaming platforms offer different degrees of security controls to their customers. Gamers, specifically children, may not have the experience or technical literacy to understand the importance of security controls offered to mitigate such threats. Beyond the immediate financial impact of stolen virtual goods, successful ATO attacks could undermine a gamer’s trust in the gaming organization that should have protected their account.
A siloed approach to addressing interconnected gaming cyber and fraud risks is becoming unsustainable. Many risks associated with fraud involve:
Each of these activities, whether taken in response to cyber or fraud attacks, is supported by common frameworks, processes, and tools. Therefore, bringing these capabilities together with data and analytics can significantly improve visibility while providing much deeper insight to improve detection capabilities. In many instances, it also enables prevention efforts.
To combat fraud occurring through ATO, some questions to consider include:
In our experience, the capabilities most implemented in Customer Identity & Access Management (CIAM) programs and capabilities include:
Historically, gaming organizations have larger growth opportunities relative to leaders from other industries (e.g., financial services, commercial aviation) from a cyber perspective. With gaming organizations’ expanding attack surface and using advanced technologies to enable innovative triple-A titles, live service gaming ecosystems, and niche mobile games alike, a strong cyber strategy is needed to address the risks introduced by these capabilities. The data2 shows the specific organizational actions to protect consumer data have a positive impact on their trust, and critical cyber failures such as ATO attacks promptly erode trust. Showing competence and intent regarding the protection of data and IP alike could help first movers within the sector influence engagement, loyalty, and purchasing behavior among gamers. This can be achieved at the intersection of fraud, identity, and detection and response teams and capabilities by sharing risk indicators to predict emerging threats.
1 Akamai, “Gaming respawned: Cyberattacks on players and gaming companies rise again,” State of the Internet 8, no. 2 (August 2022).
2 Michael Bondar et al., “Quantifying customer trust,” Deloitte Insights, 2022.