

Game Development Software: RPG Maker, Unit圓D and Unreal EngineĮncrypting all these games demonstrates the evolution of crypto-ransomware as cybercriminal target new niches. Online games: World of Warcraft, Day Z, League of Legends, World of Tanks and Metin2.Ĭompany Specific Files: Various EA Sports games, various Valve games and various Bethesda games Single User Games: Call of Duty, Star Craft 2, Diablo, Fallout 3, Minecraft, Half-Life 2, Dragon Age: Origins, The Elder Scrolls and specifically Skyrim related files, Star Wars: The Knights Of The Old Republic, WarCraft 3, F.E.A.R, Saint Rows 2, Metro 2033, Assassin’s Creed, S.T.A.L.K.E.R., Resident Evil 4 and Bioshock 2. So even if the games aren't new, when the price drops enough, then a flood of new users will start playing it.īromium provided the full list of targeted games and affected gaming software: Around Christmas, when Steam had killer sales going on, you could pick up numerous titles from that list for as little as $5. Kotov said the games are popular, but none of them are “top sellers” or “most played.” Yet some of those titles are on Steam’s “top sellers” list depending upon what titles are on sale. Bromium LabsĪlthough TeslaCrypt targets 185 files extensions, including documents, photos and iTunes, Bromium Labs security researcher Vadim Kotov noted “it targets more file types associated with video games than we have ever seen.” This ransom note is what your desktop wallpaper looks like after being infected with TeslaCrypt. This is an attempt to cash in on CryptoLocker’s notoriety. But what if it was your saved games, your mods, your DLC and your Steam account that was encrypted and held for ransom? That’s exactly what the crypto-ransomware TeslaCrypt is doing in fact it targets over 50 file extensions related to video games including Steam, single and multiplayer games, and even game development software.Īlthough the ransom window which announces “your personal files are encrypted” may look like CryptoLocker, don’t be fooled. Gamers come in all ages and from all walks of life they may or may not have files they feel are irreplaceable enough as to be tempted to pay a ransom to get those files decrypted.
