We’re currently investigating this specific series of incidents. The more data we are able to put together, the more information we’ll have to get to the bottom of this, so we would like to get in touch with the players who were affected. This request applies ONLY to players who were affected by this recent incident. Unless you match these criteria below, please go through the support ticketing system:
It would really help the support team know the following details when you write:
Any other details of note, no matter how small. If you believe you were affected by the incident yesterday, please contact [email protected], and provide you real name, account name, and a telephone number (along with the time you could accept a call about this matter and your time zone). Please note that the earliest you can expect a phone call is tomorrow. Thanks. |
Do hackers ever stop here?
Wish Swiftdeath
Quote:
I pwnd U
ANet is going to CALL people? Wow that is pretty cool... usually you have to call them.
garethporlest18
Well I hope you get to the bottom of it Regina, I don't like the idea of people being able to access accounts when those people supposedly didn't make a mistake.
{IceFire}
Sent in the email Regina, thanks for the concern
Jensy
That's.... more than a bit worrying. But at least they're working on it? O___O
Balkoth
Quote:
Unless you match these criteria below, please go through the support ticketing system:
If you believe you were affected by the incident yesterday, please contact [email protected], and provide you real name, account name, and a telephone number (along with the time you could accept a call about this matter and your time zone). Please note that the earliest you can expect a phone call is tomorrow. |
Is there any other advise you can give us in the mean time?
Stay loged on? Don't login? Don't do online bill pay etc?
Regina Buenaobra
Quote:
What if we already filed a ticket? Should we provide another email? or should we continue to addon to the plaync ticket information?
Is there any other advise you can give us in the mean time? Stay loged on? Don't login? Don't do online bill pay etc? |
Continue to work with PlayNC, and let them know that you have emailed the Support Liaison about this.
Yawgmoth
Let's get all the facts together, with the help of all affected users.
Strangely the only reports of those incidents I've seen here in this thread, and none on other forums or wikis.
By the procedure of how the hackings were done it's clear that it has to be a RMT company, it's a massive scale project they're doing in a great hurry.
They're not malicious so don't delete any characters, they only rob, as fast as possible.
They only take top value quickly sellable items or pure currency (gold/zk/e) and always trade some junk back as a mean of preventing automated detection.
They're in great hurry so often miss obviously valuable items.
They don't change passwords - they most likely can't - it may mean this method doesn't allow that, or they would do it for sure, as accounts are more valuable to them than some money.
So some Questions that hacked people should answer, so we get more facts:
Admin Edit: You are asking questions that could compromise someone's account security.
Strangely the only reports of those incidents I've seen here in this thread, and none on other forums or wikis.
By the procedure of how the hackings were done it's clear that it has to be a RMT company, it's a massive scale project they're doing in a great hurry.
They're not malicious so don't delete any characters, they only rob, as fast as possible.
They only take top value quickly sellable items or pure currency (gold/zk/e) and always trade some junk back as a mean of preventing automated detection.
They're in great hurry so often miss obviously valuable items.
They don't change passwords - they most likely can't - it may mean this method doesn't allow that, or they would do it for sure, as accounts are more valuable to them than some money.
So some Questions that hacked people should answer, so we get more facts:
Admin Edit: You are asking questions that could compromise someone's account security.
Lyssa Apate
I'd just like to add that the same happened to me. (Had to be between Monday 01:00 and 14:00 GMT+1) Someone traded my 75e for a Mini Windrider, nothing else is missing.
Shayne Hawke
I've sent an e-mail to the Support Liason per Regina's request. This will hopefully be sorted out soon.
Xun Rama
Haven't been hacked, just scanned my Gw.exe here. Mine's completely clean it looks like?
Code:
File: Gw.exe Status: OK MD5: e3446754fbd659170df74dd63ff1506d Packers detected: - Scanner results Scan taken on 24 Feb 2009 02:35:45 (GMT) A-Squared Found nothing AntiVir Found nothing ArcaVir Found nothing Avast Found nothing AVG Antivirus Found nothing BitDefender Found nothing ClamAV Found nothing CPsecure Found nothing Dr.Web Found nothing F-Prot Antivirus Found nothing F-Secure Anti-Virus Found nothing Ikarus Found nothing Kaspersky Anti-Virus Found nothing NOD32 Found nothing Norman Virus Control Found nothing Panda Antivirus Found nothing Sophos Antivirus Found nothing VirusBuster Found nothing VBA32 Found nothing
iVendetta
Stop feeding yourself to the phishers.
Adult
Ok. After reading about how everyone, including myself, who have been hacked over the last few days I have come to a conclusion. There is something we all have in common that a hacker could exploit. While we all have all these badass security thingies and un-beatable passwords, none of it matters if i am right.
If we look at this situation holistically...it tells us that the hacker has a very easy way of getting in to all of our accounts... the hacker hacked Anet.
It makes perfect sense to me. All our account info is there, emails and passwords. They can see when we log off, and there is probably a way to validate what is in the inventories of what ever accounts they look at. Why not go after the super rich? I am guessing they haven't come across those accounts yet...
Anyone see my logic here or am i paranoid?
If we look at this situation holistically...it tells us that the hacker has a very easy way of getting in to all of our accounts... the hacker hacked Anet.
It makes perfect sense to me. All our account info is there, emails and passwords. They can see when we log off, and there is probably a way to validate what is in the inventories of what ever accounts they look at. Why not go after the super rich? I am guessing they haven't come across those accounts yet...
Anyone see my logic here or am i paranoid?
Shayne Hawke
I believe that ANet would have realized and halted any attempt that was targeting them directly to harm/steal other players' accounts. Someone hacking ANet or Guild Wars would be the easiest explanation for it being the most easily visible common factor. However, that seems like the least likely as well, and they probably would have told us already if there was a security breach made/fixed at their end.
Balkoth
Quote:
I believe that ANet would have realized and halted any attempt that was targeting them directly to harm/steal other players' accounts. Someone hacking ANet or Guild Wars would be the easiest explanation for it being the most easily visible common factor. However, that seems like the least likely as well, and they probably would have told us already if there was a security breach made/fixed at their end.
|
Which ones do we have in common? GameTrailers? Aion? NcSoft maybe?
zelgadissan
Thought I would hop in and mention that my hacked friend got a call from Gaile Gray herself less than an hour after emailing with what Regina requested, so this is being taken very seriously.
Coney
Quote:
The way most AV work make it so that you need significant rewrite to escape heuristics. And I'm not even mentioning SW profiles and behaviour.
|
Quote:
Where did you learn hacking 101? All modern compilers prevent most buffer overflows, and even if you had one on the GW servers, you wouldn't use it to swap sessions...
|
Who said *YOU* are the one swapping sessions? This may be the result of unintended faulty server-side code. As in, some session variable that should be CONST somehow gets overwritten by unintention, thus setting it to point elsewhere (merits of C++? LOL)...
101? Nice, Thx for the flames. You make the bad assumption that the in-house add-hoc compiler used by GW coders is *MODERN* (or complete, consistent, "peer-reviewed", etc). Are you going to jump my ass in this thread (like the other one) based on some technicality? Did I NOT say 2 was unlikely? (checking...) "QUITE A STRETCH." Pls, take the flames to private chat in the future.
Shayne Hawke
Quote:
I agree. I would also narrow it down to our web history, I use Opera 9.63 and I'v visited a number of gaming websites (gaming websites would most likely have gaming trojans) in the days leading up to the attack.
Which ones do we have in common? GameTrailers? Aion? NcSoft maybe? |
I'm sure that Regina would prefer that we send any such details to where she has directed so that they can be the ones holding the info and not have it posted here publicly on a forum.
One thing I'd like to bring up is that we don't really have any certainty as to when the information to our accounts was compromised. We just know that it was used against us in a short period just recently. This could have been a collection that was in the works for some time now and just suddenly activated.
Coney
Balkoth
Quote:
There are two things that a person would need to quickly, easily, and successfully hack a GW account: a password and an e-mail/account name. You would have to compile a search based on where and when one of those two things was used at some other location than the GW client.
I'm sure that Regina would prefer that we send any such details to where she has directed so that they can be the ones holding the info and not have it posted here publicly on a forum. One thing I'd like to bring up is that we don't really have any certainty as to when the information to our accounts was compromised. We just know that it was used against us in a short period just recently. This could have been a collection that was in the works for some time now and just suddenly activated. |
So then, what site was it. And if i am wrong, and it came from a single or mutliple other sites that we all have accounts on we should be able to single out what we have in common.
Inde
Balkoth, you are assuming all the other hacked accounts had trojans such as you. Some people have clearly stated in this thread that their virus scanners came up clean. You could have 2 coincidences that are happening together here.
Balkoth
ok, true. But that would still leave a site in common amongst us that we had accounts on. Wheather that site had some bad banner, or lost its db. its something in common.
TheGuildWarsPenguin
A few days ago, someone in GToB asked me to join their party and go into the Isle of the Nameless.
That person repeatedly disconnected+reconnected himself, asked me to use skills, and said he was "debugging" something and told me that it was related to the party window/formation.
Suspicious?
He said something like: [DEBUG] Searching for Agent ID 25 [DEBUG] Searching for Agent ID 26
I haven't noticed anything wrong with my account yet.
That person repeatedly disconnected+reconnected himself, asked me to use skills, and said he was "debugging" something and told me that it was related to the party window/formation.
Suspicious?
He said something like: [DEBUG] Searching for Agent ID 25 [DEBUG] Searching for Agent ID 26
I haven't noticed anything wrong with my account yet.
Gun Pierson
There are two things going on:
- people received private messages on guru to buy gold, z-keys and ectos.
- accounts get hacked: hacker is mainly interested in gold, z-keys and ectos it seems.
This might be coincidence.
The hacker(s) might be following this thread too.
- people received private messages on guru to buy gold, z-keys and ectos.
- accounts get hacked: hacker is mainly interested in gold, z-keys and ectos it seems.
This might be coincidence.
The hacker(s) might be following this thread too.
Inde
We have seen screenshots of emails being sent out trying to phish for account information, we have Regina reporting GW2 beta scam websites and youtube videos to get account information, we have Gaile Gray telling us the number of RMT's scamming and stealing accounts, we have people downloading 3rd party programs, we have people who buy GW gold, we have people who admit to not having secure passwords and somehow all of that is ignored in order to try to prove a connection. Maybe that's harsh, and while I do agree something is going on you have to step back and take in the big picture versus grasping.
Adult
Quote:
again..why is this anets responsibility? it's not anets fault you traded with someone and got taken to the cleaners. So basically if anet "cared" they would "protect customers"? how can anet protect against stupidity or people that understand about the trade window. How can anet make this any simpler? if they made it idiot proof and someone got taken through trade that person would say its anets fault why?
If anet was to keep us "happy" then they should do whatever we want then to do or i will not buy gw2. Get over it. again what happened to you was your fault not anets. ironically if you had 2 million worth of gold and stuff you would have to play the game along time to get that amount of money and not know how to use the trade window? either u full of shit or not very smart ..maybe both. no wonder why gw2 takes forever to come out with all these people QQ to anet about problems "They Have To Solve" becasue of player stupidity cause if you dont fix it i wont buy gw2. Bunch of babies. |
I logged out...30 minutes later I logged back in to find my main account in GTOB not in TOA where I left her (doing vanquishing in that area so I'm 100% sure that's where i left myself)...I checked storage...They STOLE...theft...stealing... took my stuff (got it? ok just making sure)...330+ectos...100k....q9 VS...everlasting tonic...2 zkeys...maybe something else This was done by the hacker logging in as me and trading my items to his account in place of a Grail of Might (which I never use)... So if you bothered to read any of these posts you would find the same thing happened....we are all very protective of our passwords, accounts, names, whatever...logged in in GTOB and found things missing, so please read the posts first before you QQ our QQ...kthxbai
Gun Pierson
@ Inde: Ofcourse, the chance would be very small.
Changed my mail here as it was linked to my account, replaced it with a new email address, does the old still stay in your list?
Anyway they can prolly track him down fast.
Changed my mail here as it was linked to my account, replaced it with a new email address, does the old still stay in your list?
Anyway they can prolly track him down fast.
Inde
Nope, you change it, it changes it in the db.
Gun Pierson
Ok thanks for the info!
gone
not that it really matters...and I didn't screen shot it.
sometime around the new FF release 3.0.6 (of course I use no script/adblock plus/adblock filtersetG.updater) I think the release was around & about the last holiday event. anywho... and this has NEVER happened to me with this site...
I was getting a nice pop-up via FF stating this was an attack site. never happened before, and somehow it just magically went away. I never messed with a single setting.
-----------------------------
my GW.exe
http://www.virustotal.com/analisis/4...7871121892faba
sometime around the new FF release 3.0.6 (of course I use no script/adblock plus/adblock filtersetG.updater) I think the release was around & about the last holiday event. anywho... and this has NEVER happened to me with this site...
I was getting a nice pop-up via FF stating this was an attack site. never happened before, and somehow it just magically went away. I never messed with a single setting.
-----------------------------
my GW.exe
http://www.virustotal.com/analisis/4...7871121892faba
Lycan Nibbler
Quote:
I had about 2 mil worth of items, gold, ectos, tonics looted yesterday and a grail of might traded to me for it. The fact that someone is trading items to us for our items tells me a few things... it tells me that blank trades where someone trades stuff for nothing pops up on some "radar" at anet so they can track gold sellers/buyers and the such...So this also tells me that if blank trades are monitored then all trades are or can be monitored, so my conclusion is that if we are able to give a specific enough window of time then anet can track down who "i" traded to and what items were traded. End result, if someone at anet actually cared enough we could get all our stuff back and the other persons account could get banned, perhaps all accounts tracked form their originating IP could be banned as well, but that might be a bit much to ask.
|
Unfortunately, we get what we pay for.. no monthly fee = little to no in game monitoring of what actually happens.
Lycan Nibbler
Originally Posted by Jhadur
Do any of the other people getting hacked have their accounts linked to NCSoft?
Was it not the NC Soft site that was attacked one time previously when people who had linked their accounts there were the ones attacked??
Good luck to the guys who got attacked anyway, I hope anet gets to the bottom of this and finds some way to reverse the trades.
Do any of the other people getting hacked have their accounts linked to NCSoft?
Quote:
From what I've read so far, this is a blaring coincidence (until shot down!).
|
Good luck to the guys who got attacked anyway, I hope anet gets to the bottom of this and finds some way to reverse the trades.
the_jos
Quote:
You'd be very surprised:
http://www.securityfocus.com/brief/762 <on MD5 dictionary attack> Ok, I guess you're aware of the batches of MD5 collision done in the research litterature. Now, just so you know, experts are not expecting any real pratical progress before a few years, these were only theoretical attacks on MD5. <on brute forcing passwords> The guy who's going to do that will win bigger by being hired by the NSA, rather than exploiting his stolen data. |
First of all, the trojans used for gaining access to game accounts do excist.
However, when looking at their characteristics they are nothing compared to a banking trojan like Mebroot.
Second, while it might look hard to generate a MD5 dictionary or bruteforce them it's not that hard in reality.
It's not like we are generating collissions in huge documents.
We are talking about bruteforcing strings with known specifications.
We can safely asume that most of the passwords will be in the [a-Z][0-9] format. We can also assume that the password length is between 6 (if GW does not enforce a minimum of 8) and about 15 with the majority below 10 characters. That limits the list a lot.
Furtermore we can assume that the base of most passwords will be vulnerable against a dictionary attack.
So we take the dictionary and MD5 that one. Then we take that same dictionary and start adding numbers, making sure the total length does not exceed 10 (as start). So we start with '0password' to '99PASSWORD' and 'password0' to 'PASSWORD99'. Generating the MD5's on such lists is trivial.
And I think lists are available already. The same for SHA1.
Now if we were to compute a random string of [a-Z][0-9] things would already be different. Even at 9 characters we would be looking at an astonishing 13.000.000.000.000.000 combinations if I'm not mistaking. Add in an additional 25 uncommon characters and it will be 285.(lots of zero's again).
That's very time consuming to brute force.
So much for theory.
Practice is that people will use passwords that are vulnerable to dictionary attacks most of the time. That's the easiest to remember.
If that password is stored as 'plain MD5' in a database and that database is compromised (that's why you should not reuse passwords for things you care about) it's easy to obtain the real password.
As for people storing encrypted passwords in databases, it's easy to salt the password.
What it does is making each MD5 or SHA1 checksum 'unique'. If the word 'password' is encrypted this would generate a checksum (example, not going to calculate it for real) 'ABCD'. Doing the same with '1password' would generate 'DKFR' while '2password' would generate 'YRFT'. When the salt is long enough it would make the password impossible to obtain. Adding a salt of 3 characters [a-Z][0-9] would make it about 4.000 times harder to crack the password.
Doesn't look like much, but consider the 13.(many zeros) and multiply that one by 4000.
What I've done in the past is just using the UID to salt passwords.
Not on very sensitive information but in general it's good enough.
So much on this. Bottom line, use 'special characters' in your password, don't use important passwords on other places, try to avoid words from the dictionary.
And..... Why don't you write your password down and put it somewhere safe if you can't remember it because it's too complicated (like A^J$sT%P#@). It's not like someone willing to access your GW account will break into your house to obtain your password. Well, I assume you can trust your family....
The same for other important passwords. Just make sure that if someone does break into your house and obtains the list he/she can't do anything with it (so no UID/pass/application combinations).
Jhadur
Quote:
Good luck to the guys who got attacked anyway, I hope anet gets to the bottom of this and finds some way to reverse the trades.
|
(If they even looked of course)
Lycan Nibbler
Quote:
Anet told me when I was attacked that there is no way that they would be able to return any items taken. Even if they found the person that had done it.
(If they even looked of course) |
I've been somewhat paranoid, as I've been getting a lot of err7s the past few days myself (unusual for me) - got me checking under the bed (so to speak).
The Little Viking
Quote:
That's what it does now, Gaile said a while ago. If you get the password wrong a few times, it kicks you out for an exponentially increasing amount of time, so brute forcing won't work. This must be keylogging or some packet manipulation or something.
|
BTW: My husbands account was hit today. 2 characters in GToB.. lost uncustomized torment staff and 400K. In its place he got a fungal wallow.. Oh Goody!
So far, my account is safe.. for the time being...or it was 30 minutes ago. Hes not happy and neither am I...I got him a new staff (aint I sweet)...just hope its still there in the morning. This time he customized it.
Best of luck to us all on hanging on to our stuff. Just like a lot of folks here, he changed password, did all the usual precautions and still got hit.
Taco Fiend Taco
I've been getting a lot of d/c's and err since the weekend too. It almost never happened before that. It has made me quite nervous about things.
Also, I read the whole string but can't remember if this was mentioned...one commonality in this is it appears everybody has a guru account. At least I haven't seen anywhere else an explosion of complaints about 'I wuz hacked'.
Also, I read the whole string but can't remember if this was mentioned...one commonality in this is it appears everybody has a guru account. At least I haven't seen anywhere else an explosion of complaints about 'I wuz hacked'.
Shasgaliel
Quote:
I've been getting a lot of d/c's and err since the weekend too. It almost never happened before that. It has made me quite nervous about things.
Also, I read the whole string but can't remember if this was mentioned...one commonality in this is it appears everybody has a guru account. At least I haven't seen anywhere else an explosion of complaints about 'I wuz hacked'. |
My guildie was hacked and he has no guru account and no GWO account etc. He has Ncsoft account though.
refer
Guild Wars needs a logging method of ALL trades... with who, what, and when.
fusa
Anet does keep logs of trades as well as chat in game. This is why they want to know the outpost, district, and time when a ticket is submitted. It helps narrow down the search for relevant logs of the incident. The reason no items can be replaced is because it can be easily exploited. Since only a very small number of people have been hacked, its not Guru or NCSoft's web site's security, its the people who were hacked.