The gaming industry continues growing. The Newzoo report for 2023 reveals that two in five — more than three billion — across the globe are gamers, which is 6.3 percent more than last year.
Globally, gaming revenue amounts to an estimated US$242.39 billion, with almost half of that generated by the Asia Pacific. By the year 2030, this worldwide total is expected to more than double to US$583.69 billion.
New game titles have appeared this year, such as The Legend of Zelda: Tears of the Kingdom, Hogwarts Legacy and Star Wars Jedi: Survivor, while older titles have continued to be popular with fans. Millions around the world are still building new worlds in Minecraft and honing their skills in multiplayer online battle arenas, such as Defense of the Ancients (DOTA 2), and tactical shooters, such as Counter-Strike: Global Offensive (CS:GO), with the latter only growing in popularity.
With the revenue and the number of gamers on the rise, the gaming industry continues to be a lucrative target for cybercriminals, with long-awaited and just popular titles being used as a lure in malicious campaigns. Given that nearly a quarter of players were underage as of 2022, they may be easy prey for the attackers. In this report, we provide our insights into the gaming-related threat landscape in 2023.
To gain an insight into the current landscape of gaming-related cybersecurity risks, Kaspersky has conducted extensive research into prevalent threats targeting the gaming community. Our investigation encompassed attacks that involved threats disguised as game apps, mods and cheats, and features analysis of some of the most active malware families operating in this domain. We also analyzed phishing pages using various game titles and gaming platforms as a lure. Our analysis drew on data sourced from the Kaspersky Security Network (KSN), which is a system for processing anonymized cyberthreat-related data shared voluntarily by Kaspersky users, from July 1, 2022 to July 1, 2023.
Kaspersky experts researched threats related to the top 14 games available for download or poised for release on streaming platforms, such as Origin and Steam, as well as platform-agnostic titles, to provide a comprehensive overview of current threats. The list of titles is based on several rankings of the most popular games available on the internet.
Our team analyzed threats associated with mobile (where applicable) and desktop versions of Minecraft, Roblox, Counter-Strike: Global Offensive (CS:GO), PlayerUnknown’s Battlegrounds (PUBG), Hogwarts Legacy, Defense of the Ancients 2 (DOTA 2), League of Legends, World of Warcraft, Apex Legends, Diablo IV, Star Wars Jedi: Survivor, The Legend of Zelda, Baldur’s Gate 3 and Final Fantasy XVI.
From July 1, 2022 to July 1, 2023:
From July 1, 2022 to July 1, 2023, Kaspersky solutions detected 4,076,530 attempts to download a total of 30,684 unique files, which were being distributed under the guise of popular games or mods, cheats and other game-related software, and affected 192,456 users worldwide. Most of these files were unwanted software called “Downloaders” (89.70%). Not dangerous in itself, this type of software downloads various other programs including malware onto the device. Adware (5.25%) and Trojans (2.39%) were also in the top three desktop gaming-related threats.
TOP 10 threats using popular games as a lure, July 1, 2022 to July 1, 2023 (download)
Of the 14 games we chose for this research, Minecraft (70.29%) remained the most popular one with cybercriminals. This evergreen sandbox game has more than 160 million monthly active players in 2023, and is still one of the world’s most-played computer games. Threats using this game as a lure affected 130,619 users globally during the reporting period.
Malware and unwanted software mentioning Roblox – the second most-targeted game title – in file names triggered 20.37% of alerts on the computers of 30,367 users, followed by Counter-Strike: Global Offensive (4.78%), PUBG (2.85%), Hogwarts Legacy (0.60%), DOTA 2 (0.45%) and League of Legends (0.31%).
Games by number of related threat detections, July 1, 2022 to July 1, 2023 (download)
Game title | Unique users |
Minecraft | 130,619 |
Roblox | 30,367 |
CS:GO | 23,429 |
PUBG | 5,891 |
Hogwarts Legacy | 4,007 |
DOTA 2 | 1,922 |
League of Legends | 986 |
World of Warcraft | 387 |
Apex Legends | 322 |
Diablo IV | 264 |
Star Wars Jedi: Survivor | 216 |
Legend of Zelda | 214 |
Baldur’s Gate 3 | 153 |
Final Fantasy XVI | 7 |
Games by number of users affected by related threats, July1, 2022 to July 1, 2023
Game title | Unique files |
Minecraft | 14,405 |
Roblox | 8,682 |
CS:GO | 4,498 |
PUBG | 2,569 |
Hogwarts Legacy | 945 |
League of Legends | 523 |
DOTA 2 | 418 |
Apex Legends | 350 |
World of Warcraft | 263 |
Star Wars Jedi: Survivor | 88 |
Diablo IV | 54 |
Baldur’s Gate 3 | 53 |
Legend of Zelda | 37 |
Final Fantasy XVI | 6 |
Games by number of unique files using their name as a lure, July1, 2022 to July 1, 2023
The mobile gaming community, playing video games on mobile devices like smartphones and tablets, has become a driving force since the pandemic. As it offers convenient and accessible gaming anywhere, it is attracting big user numbers around the world, especially in the United States and Asia Pacific. According to Statista, the number of mobile gamers is to reach 2.3 billion by 2027.
Although not all games on our list are officially ported to mobile phones and tablets, with some mobile versions shut down soon after being launched or even on the development stage, every now and then third party mobile adaptations appear, as well as malicious traps for those willing to know if it is at all possible to play the game on mobile.
From July 1, 2022 to July 1, 2023 Kaspersky solutions detected 436,786 attempts to infect mobile devices of 84,539 users. Most of the researched game titles were used as a lure for mobile gamers at least once.
Games by number of related mobile malware and unwanted software detections, July 1, 2022 to July 1, 2023 (download)
Once again, Minecraft players were the primary targets, with 90.37% of attacks relating to this title. These attacks impacted 80,128 gamers.
In one instance, Indonesian mobile gamers were targeted by cybercriminals who used Minecraft as their gateway for Trojan.AndroidOS.Pootel.a, which opens the Minecraft page in an alternative application marketplace when the application launches on the user’s phone.
Then, by using malicious code, it begins to quietly register mobile subscriptions. To obtain the phone number, which is necessary for completing a subscription, the application uses the Google Phone Number Hint API. It then opens the subscription activation page in an invisible window and inserts the received user number into the appropriate field. After that, it clicks the Subscribe button, intercepts the confirmation code from an incoming text message and pastes it into the required field on the confirmation page.
Kaspersky gaming threat research also revealed that the most frequently targeted mobile Minecraft gamers were those from the Islamic Republic of Iran. In this country, 140,482 alerts were triggered, impacting 54,467 Minecrafters.
PUBG: Battlegrounds Battle Royale – the second most popular mobile game recorded by Kaspersky – logged 5.09% of all alerts, most of these coming from players in the Russian Federation.
Roblox (3.33%) was third by number of detections, but second by number of affected users – 2351 against 1294 for PUBG. One of the malware families targeting Roblox fans, was the SpyNote spy Trojan, which was being distributed among users under the guise of a mod. It has a number of spying capabilities, such as logging keystrokes, recording the screen and broadcasting video from phone cameras, and it can also imitate the official Google and Facebook apps to trick the user into revealing their passwords.
The fourth most-targeted mobile game was Baldur’s Gate (0.68%), a role-playing video game series set in a forgotten realm’s dungeons and dragons world, which does not have an official mobile version. Most of the affected gamers were located in Russian Federation, Brazil and Turkey.
Game title | Unique users |
Minecraft | 80,128 |
Roblox | 2,351 |
PUBG | 1,294 |
Baldur’s Gate 3 | 304 |
Final Fantasy VI | 115 |
Diablo IV | 108 |
CS:GO | 72 |
Legend of Zelda | 63 |
Apex Legends | 29 |
Dota 2 | 27 |
League of Legends | 26 |
World of Warcraft | 19 |
Star Wars Jedi: Survivor | 3 |
Games by number of unique users targeted by game-related threats, July 1, 2022 to July 1, 2023
In this section, we provide insights into phishing campaigns that use some of the 14 games covered in the report, along with some other titles, as a lure.
Malicious and unwanted software disguised as popular games is often distributed by third-party websites that offer pirated versions of the titles. In the screenshot below, you can see examples of such websites, offering to download Atomic Heart, CS:GO and Euro Truck Simulator “for free”.
Some of these pages show a relatively high number of downloads below the Download button, most likely to assure the user that the software is safe. Clicking the button downloads an archive, which may contain unwanted or even dangerous software, but not necessarily the game itself.
As most games allow users to purchase and sell valuable in-game items, gaming accounts are a lucrative target for cybercriminals, especially those that contain a good collection of popular titles in addition to a linked credit card.
One of the most popular lures in case of games is free giveaway of in-game items or skins. The generous offers on the screenshots below will most probably result in your Steam or Riot Games account being stolen. The scheme is simple: to take part in the fake giveaway, you have to sign in to your account, which means entering your credentials on the phishing website.
Counter-Strike fans are often targeted with “free” skins, which may be valuable property in this game. Last year, a user lost two million dollars’ worth of skins after their account was hacked. Unfortunately, those falling for phishers’ offers will lose what they already have rather than get a valuable skin for free.
Another site offers something named “Counter-Strike 2 limited test”, but only to those who are willing to link their Steam account. However, if a user does link it, it will be compromised, and no access to the beta version of the game will be granted.
Besides gaming accounts, cybercriminals target gamers’ social media profiles. These are valuable to the fraudsters, as they typically contain a lot of personal data and linked payment details. Moreover, social media accounts are often used to sign in to other services including online games. Last but not least, through a stolen social media account, cybercriminals can target the victim’s friends and relatives with various scams.
In the screenshot above, phishers lure PUBG players with an in-game item giveaway. To participate, you need to sign in to your Facebook, X (ex-Twitter) or other social media account on the fake website. As soon as you do that, your credentials will be stolen.
Similar bait is used in scams where users are tricked into paying cybercriminals a certain amount of money to obtain a gift card, in-game currency or a brand-new game. Typically, on such websites, you need to first enter some personal details and fill out a simple survey. A page is then shown, telling you that you have won a valuable prize. The only thing left to do before you can claim it is pay a small delivery fee. However, by doing this, a victim not only loses the money paid, but also compromises their bank card.
In the screenshot below, you can see a typical example of this scam. The cybercriminals offer users “free Apex Legends gift cards”. To get those, you have to first enter your username, then answer several questions and pay for your prize.
To Roblox players, the fraudsters often offer to earn, generate or just get some Robux (Roblox in-game currency) for free. Similarly to the Apex Legends example, if a user tries to withdraw the “earned” or generated money, they have to make a payment on a fraudulent website.
Another option scammers often resort to, is offering a hefty discount for a hot title. In the screenshot below, a rogue website pretends to be selling Star Wars Jedi: Survivor for $28.7, which is less than a half of the official price.
Should the user pay, most likely, they will get nothing, but lose their money and bank card details.
Gaming platforms have always been attractive targets for cybercriminals as they store a wealth of personal and financial data that ranges from payment details to email addresses and other personally identifiable information. Fraudsters make money by stealing in-game items and currency, which often have real-world value, or selling hacked accounts.
Cybercriminals are also increasingly using games – such as Minecraft and Roblox – aimed at young audiences, as a lure to exploit inexperienced computer users who lack cybersecurity awareness, with malicious or unwanted software.
With this in mind, it is imperative that young gamers’ parents educate themselves, so they can help protect their kids. There is a plethora of excellent resources online explaining the major threats to help new gamers have fun and stay safe, even if you are not a natural techie.
To keep your kids safe online, Kaspersky recommends that users:
That being said, it is worth keeping in mind that it is not just young gamers that are targeted. Cybercriminals often seek to infect as many machines as possible and steal as many accounts as possible. Moreover, grown-up gamers often invest more money in their hobby, so their accounts are a more attractive target than those of kids. That is why it is important to stay vigilant, avoid downloading anything from shady third-party websites or sharing any personal details with those. Needless to say, the developers of gaming cheats and hacks may well cheat on their audience themselves, so you should think twice before downloading software like that.
To stay safe while gaming, Kaspersky recommends: