Results 1 to 10 of 22
Thread: EA Origin hacked: Allows attackers to hijack PCs
-
03-18-13, 04:59 PM #1
EA Origin hacked: Allows attackers to hijack PCs
Bug in EA’s Origin game platform allows attackers to hijack player PCs | Ars Technica
The attack, demonstrated on Friday at the Black Hat security conference in Amsterdam, takes just seconds to execute. In some cases, it requires no interaction by victims, researchers from Malta-based ReVuln (@revuln) told Ars. It works by manipulating the uniform resource identifiers EA's site uses to automatically start games on an end user's machine. By exploiting flaws in the Origin application available for both Macs and PCs, the technique turns EA's popular game store into an attack platform that can covertly install malware on customers' computers.
"The Origin platform allows malicious users to exploit local vulnerabilities or features by abusing the Origin URI handling mechanism," ReVuln researchers Donato Ferrante and Luigi Auriemma wrote in apaper accompanying last week's demonstration. "In other words, an attacker can craft a malicious Internet link to execute malicious code remotely on [a] victim's system, which has Origin installed."
Always folks, be careful when clicking links.
-
-
- Join Date
- 02-13-07
- Location
- Fort Worth, TX
- Posts
- 42,785
- Post Thanks / Like
- Blog Entries
- 5
-
-
- Join Date
- 11-13-07
- Location
- Plano, TX and Ruston, LA
- Posts
- 32,364
- Post Thanks / Like
- Blog Entries
- 43
-
- Join Date
- 05-28-07
- Location
- East Texas
- Posts
- 7,960
- Post Thanks / Like
- Blog Entries
- 9
-
03-18-13, 06:06 PM #7
Re: EA Origin hacked: Allows attackers to hijack PCs
Haven't touched Origin since installing BF3 when it came out, lol...I'm glad EA makes it so easy to stay away from their crap.
SmokenScion liked this post
-
03-19-13, 12:28 AM #8
Re: EA Origin hacked: Allows attackers to hijack PCs
To be fair (and this is coming from someone who hasn't bought anything EA since I got the deal I did on BF3), these sort of things aren't exactly uncommon. These gimongous software applications are bound to have loopholes. Of course the hackers will look through the codes to find what can and can't be exploited.
Speed. I am speed.
-
-
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Bookmarks