The gaming industry’s latest challenge: DDoS protection

As the industry faces a rise in DDoS threats, it is time that gaming companies truly prioritise cybersecurity and business resiliency. In his latest article, Babur Khan,Technical Marketing Engineer at A10 Networks, lays out a framework for the industry to do just this, securing their customers and their own success against the tide of cyberattacks.
As the industry faces a rise in DDoS threats, it is time that gaming companies truly prioritise cybersecurity and business resiliency. In his latest article, Babur Khan,Technical Marketing Engineer at A10 Networks, lays out a framework for the industry to do just this, securing their customers and their own success against the tide of cyberattacks.

Like moths to a flame, hackers always go where the action is. As the Covid-19 pandemic drove work away from the office, businesses have faced one cyberattack after another on their remote work infrastructure. Meanwhile, a boom in virtual entertainment has brought a surge of players to the gaming industry—and with them, a rise in DDoS attack activity. Cybercrime rings are launching triple extortion campaigns combining DDoS attacks with ransomware, and data theft, while ordinary gamers can rent a botnet easily and affordably to cheat or disrupt competition with a DDoS attack of their own. The highly popular Titanfall 2 game has already been rendered virtually unplayable—perhaps by as few as one or two individual players—and seemingly abandoned by its publisher, which is now focusing on defending a newer title from similar attacks.

This escalating cyberattack activity poses an urgent challenge for the gaming industry: achieve the level of DDoS protection needed to keep its products playable—or risk alienating the fans whose loyalty it depends on.

The DDoS Attack Menace

One of the most prevalent forms of cyberattack, a DDoS attack seeks to overload its victim’s network or infrastructure with a high-volume flood of illicit traffic from multiple locations at once. Often, these attacks are launched using a botnet—a network of computers and devices that have been infected by malware and recruited by cybercriminals. A single instruction can direct thousands of botnet members to target a given IP address, causing the victim’s systems to crash or leading its ISP to suspend service under a “noisy neighbour” policy to protect resources needed for other customers.

Far from an ad hoc, homegrown exploit, the DDoS attack industry is sophisticated and thriving. Cybercrime rings rent out DDoS-for-hire services that allow anyone to launch a DDoS attack quickly and inexpensively. For a gamer, an attack lasting long enough to disrupt an opponent’s session can cost less than a can of energy drink. At the high end, a botnet named “Simps” has recently been identified as part of the arsenal of the Keksec cybercrime organization. Infecting IoT devices in tandem with BASHLITE malware, Simps is already being used to launch DDoS attacks on gaming targets.

The Gaming Industry Comes under Fire

While DDoS attack activity is on the rise, it’s a threat the gaming industry has faced for many years. As long ago as 2016, a teenager used a variant of the Mirai botnet to launch a DDoS attack against the Sony PlayStation platform, costing the company US$2.7mn in revenue. Such exploits generally come in two forms: cheating or retaliation by individual gamers, or financially motivated schemes by professional cybercriminals. In either case, the impact of these attacks is all too easy to see. In the case of Titanfall 2, continuous DDoS attacks have made the game all but unplayable.

The ease of launching a DDoS attack makes it a highly appealing tactic for unscrupulous players. By targeting an individual opponent, the attacker can render their session slow or unplayable, gaining a significant competitive advantage. With professional esports teams vying for as much as $30mn or more in prize money in a single competition, there can be much more than bragging rights at stake. In fact, leading studios such as Respawn, Activision, and Ubisoft have banned gamers found to have used DDoS attacks to cheat, while Ubisoft filed suit against the operators of four DDoS-for-hire services that had been used to launch attacks on its Rainbow Six Siege multiplayer servers.

Beyond unscrupulous or disgruntled gamers, game publishers have also fallen into the crosshairs of the same cyberattack rings targeting industries from financial services to government and healthcare. In those industries, attackers gain leverage from the critical—even life-and-death—importance of keeping systems available for account holders, constituents, doctors, and patients. Uptime can be nearly as vital in the gaming industry, where customers are often intensely engaged and heavily invested in their favourite titles and systems. Combined with their high sensitivity to latency and availability issues, this makes online gaming platforms a prime target for extortionate schemes such as a ransom-related DDoS attack (RDOS).

Ensuring High-Quality Play with DDoS Protection

When every millisecond matters, reactive DDoS protection measures prove ineffective for gaming industry victims. When a DDoS attack is discovered, legacy solutions often respond by clamping down on traffic to protect the targeted system from being overloaded—side-lining legitimate players alongside hackers. By the time the attack has been analyzed and neutralized, the damage to customer sessions and the game’s reputation has already been done. In fact, hackers increasingly deploy multi-vector exploits that make it even harder for security teams to respond quickly and keep platforms available.

Rather than waiting for a cyberattack to happen, then responding, gaming platform operators must take a proactive approach to DDoS protection. This begins with zero trust—a security model based on the idea that organizations should not automatically trust anything inside or outside the network perimeter. Before allowing access to its systems, the operator should perform multiple checks for legitimate access rights; once inside, the player should continue to be checked to prevent authenticated players from going rogue. At the same time, continuous, real-time validation can’t be allowed to compromise the gameplay experience.

Essential elements of DDoS defence for the gaming industry reflect best practices for web security across every vertical, including leveraging threat intelligence to block IP addresses known to host DDoS weapons; blocking unauthenticated access, unwanted, and unusual behaviour; verifying time-sensitive watermarks on every packet; and deploying zero-day attack pattern recognition.

READ MORE:

The gaming industry has thrived by providing deeply immersive, richly realized, and highly responsive experiences for players. By taking a proactive, zero trust-based approach to DDoS protection, gaming platform operators can keep cheaters and criminals from spoiling the fun for players and fans.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Babur Khan

Babur Khan is the Technical Marketing Engineer at A10 Networks.

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...