Kids videos games are acting as espionage points for missile attacks


Nist Framework

While malware attacks embedded in games have been a longstanding cybersecurity concern, a more sinister threat has emerged. Researchers have uncovered a disturbing new tactic: cybercriminals are now manipulating video games as bait to recruit child players, ultimately using them to launch missile strikes.

In a detailed investigation, the Ukrainian National Police and the Security Service of Ukraine (SBU) have uncovered a new form of espionage. Russian cybercrime groups, allegedly linked to Russia’s Federal Security Service (FSB), have been targeting children aged 14 to 16, enticing them with promises of rewards such as Bitcoin (BTC) deposits into digital wallets.

The tactic is chillingly simple. These hackers encourage children to log into a game, then instruct them to take pictures and record a short video of their surroundings, complete with geolocation tags. The children are then asked to send the footage to an anonymous contact via the Tor network, a tool often used to mask identities and locations.

Once the video is sent, the child is directed to continue playing a virtual reality (VR) game, often with the suggestion of wearing a VR headset for a more immersive experience. In some cases, the child is prompted to sabotage public infrastructure, such as damaging electric transformers or hacking into CCTV networks at nearby intersections. Detailed instructions on how to carry out these tasks are often provided in the form of templates.

After receiving the geotagged video, the attackers use the information to pinpoint the child’s location and subsequently target the area with missile strikes, causing devastation in cities like Kyiv and Kharkiv.

According to the SBU, these child recruits are typically contacted through various messaging platforms, with private, invite-only chat networks being used for more secure communication. This makes it difficult for authorities to detect or monitor the conversations, as current technology does not always capture encrypted messaging networks.

This is not the first instance of cyber exploitation linked to the ongoing conflict. In March 2022, civilians were recruited to hack into local camera networks, giving Russian operatives control over them. This move resulted in a significant increase in physical attacks, with violent incidents rising by 50%.

The latest developments underscore a disturbing trend in the ongoing war between Russia and Ukraine, which began in February 2022. As cyber warfare escalates, Russia appears to be leaving no stone unturned in its efforts to undermine Ukraine. Children are now being exploited through the very medium of gaming to carry out covert attacks on critical infrastructure.

As the conflict continues, it seems unlikely that either side will seek peace talks in the near future. Meanwhile, the innocent population of Ukraine remains caught in the crossfire, with the country’s critical infrastructure increasingly vulnerable to cyberattacks.

Looking ahead, there is hope that future leadership, such as that of the incoming U.S. president, may pave the way for a resolution to the war’s devastating consequences—especially as the conflict shows no sign of abating in the immediate future.

Ad



Source link