Published September 10, 2013
Reflection DDoS attack methods, called DrDoS, involving the online video gaming community, are widespread and harm gaming and non-gaming targets alike. Learn about the history of denial of service attacks in gaming and reflection attack tools that use gaming servers – including Quake, Half Life and Call of Duty – to attack non-gaming targets.
The online video gaming infrastructure supports hundreds of millions of online gamers — Comscore estimated that online gaming communities had amassed 671 million users worldwide by April 2013, with 145 million gamers playing on a daily basis1.
The availability and accessibility of online gaming infrastructures and devices creates opportunities for malicious actors to use freely available underground tools to launch DDoS attacks against gaming consoles, and steal gaming network login credentials from legitimate users. A history of malicious behavior follows the online video gaming industry and denial of service attacks occur frequently and keep evolving. Attacks are widespread and harm gaming and non-gaming targets alike.
Malicious actors vary in their motivations, methods, and use of online gaming servers, including:
Gaming network administrators should implement several prevention measures to prevent the types of attacks discussed in this whitepaper: