Gamedev and security: recommendations for protection against hacker attacks Columns 06 February 2024 Yuri Shabalin Yuri Shabalin Co-founder of Stingray Technologies (Swordfish Security Group) According to a closed report by Statista, ransomware in the gaming industry accounted for more than $184 million in officially registered losses in 2023. The albania telegram database most high-profile of these were attacks on the Polish developer CD Projekt Red (the creator of Cyberpunk 2077, Witcher 3, and others), as well as on Insomniac Games, which creates games for the Marvel universe.
Here, hackers encrypted access to full versions of source codes for new versions of games, customer payment data, personnel and investor information. In Russia, such incidents are hidden. However, thanks to the research of the Solar Group, it is known that the gaming industry is one of the three leaders in terms of the number of data leaks in .
It accounted for about 10% of the total 91.8 terabytes of leaked data. There is every reason to believe that the security situation will worsen. A huge share of incidents can be avoided if you deal with the security of gaming software at the development stage.
Yuri Shabalin, lead architect of Swordfish Security, told us how best to do this. Subscribe to RB.RU in Telegram Why and how games are attacked In the Russian gaming software market, 70% of development is in the mobile devices segment, 20% in computer games, and about 10% in console games.
There is an opinion that our programmers produce the best mobile hits in the world, but for more complex and deep computer games there is not enough experience and money. Now everything has become even more complicated due to the political situation: the market has shrunk several times.
But it is important to understand that safety is not something to economize on. Especially since losses in case of incidents can be impressive. When assessing software security, security experts take into account several areas: infrastructure; network interaction; software code; user interaction logic. All four of these aspects must be covered by at least basic security practices, otherwise work on the others is meaningless.
Signs He Should Adjust His Strategy
-
sadiksojib35
- Posts: 303
- Joined: Thu Jan 02, 2025 7:10 am