SlideShare a Scribd company logo
1 of 36
PANOPTICON
LABORATORIES
How Fraudsters Are ‘Following
The Money’ Into Online Games
www.panopticonlabs.com
March xx, 2016
Screenshot of Watchtower UI
PANOPTICON LABORATORIES is the first and
only in-video game cybersecurity company, built
to protect online video game publishers from the
financial and reputational damages that can result
from cyber attack.
Through proprietary technology that is uniquely
focused on gameplay itself, Panopticon sets a
baseline of activity for every player who
participates in online play. Upon discovering
anomalous behavior, Panopticon alerts publishers
with more than 99% accuracy, along with
providing recommendations for incident
investigation and immediate remediation.
ABOUT US
PROTECTING ONLINE GAMES FROM IN-GAME THREATS
WHT DOES GAME FRAUD
LOOK LIKE?
FRAUDSTERS = WORLD
KILLERS
Hackers, cheaters, and
fraudsters are a cancer
that kills virtual worlds.
increase in account takeover
Steam Trading allows players to
exchange virtual items.
accounts are hacked every month
• Cheap – Only $30 gets script kiddies source code,
manuals, and tutorial videos.
• Effective – uses state of the art obfuscation
techniques, rendering it invisible to most AV.
• Evolving – leaked source code has lead to a
development arms war.
• Defeats Multifactor – Kaspersky has shown that
Steam Stealers can neutralize Steam’s primary defense
against unauthorized trades.
NEW MALWARE: “STEAM
STEALER”
MONEY IN GAMES
The evolving video game business
model:
Online games generated
In 2015.
WHY FRAUD?
Global movie box office
.
It was true in banking.
It was true in eCommerce.
Now it’s happening
in video games.
http://kasperskycontenthub.com/securelist/files/2016/03/Steam_Stealers_research_ENG.pdf,
or Google “Kaspersky Steam Stealers”
MORE THAN ACCOUNT
TAKEOVER
Gold Farming
Botting
Credit Card Fraud
WHAT’S NEEDED?
WHEN SURVEYED, GAME PUBLISHERS AND DEVELOPERS HAD
VERY SPECIFIC IDEAS ABOUT WHAT THEY WANTED AND
NEEEDED…
SURVEY OF 50+
PUBLISHERS
Over 18 months, online game publishers were asked:
• What are you doing now to fight fraudsters, cheaters,
and hackers?
• How effective are those solutions?
• What other solution(s) do you wish you had access to?
COMMON SOLUTIONS
MANY TOOLS WERE INITIALLY DEVELOPED FOR OTHER
INDUSTRIES
• Multi-factor, IP/GEO, Black/WhiteListing, challenge
questions, and device fingerprinting and reputation
tracking have all been attempted.
• List-based solutions draw from years of institutional
wisdom and databases.
• “The problem with using tools built for banks to
secure games is that bad guys have had years to
figure out how to break them.”
DIFFERENT GENRES;
DIFFERENT PRIORITIES
• MMO: Account Takeover
• Free-To-Play: Account re-selling;
gray markets
• Social Casino: Cheating; collusion.
• Real-Money Casino: Money
laundering; cybercrime
MOST-COMMON SOLUTION
Many publishers
create rules-
based reports
based on what
has happened in
the past.
OBSERVE
CONFIRM
FORENSICS
ADD RULES
ALL AGREE:
Lots of overlap – bad actors from across the
spectrum are constantly looking for advantage.
It should be addressed – even most aren’t
exactly sure HOW to fight back.
It’s about more than money – reputational
damage, player dissatisfaction leading to churn,
and premature shortening of the game’s life are
also important.
"One of the most important things you
have as a developer is the community
you can take with you."
CASE STUDY
HOW ONE LARGE, DATA-DRIVEN PUBLISHER FOUND ITSELF AT THE
MERCY OF CYBERCRIMINALS DESPITE THE USE OF CUTING-EDGE
TECHNOLOGY
SOCIAL CASINO
Players cannot cash-out chips; play
in large, social settings through
mobile and Facebook
13 MILLION PLAYERS
HALF ON MOBILE; HALF CONNECTING VIA FACEBOOK
• Had the advantage of Facebook’s authentication
controls paired with Apple’s app-level validation tools
and a variety of traditional front-end services.
• Employed cutting-edge back-end transaction security
controls via their credit card processor.
• Very data-centric since the company was founded;
prided itself on the quality – and quantity – of its player
data.
WORLD-WIDE COVERAGE
EMPLOYED TEAMS AROUND THE GLOBE TO WATCH OUT FOR PLAYERS
• As fraud and gray market losses mounted, more
employees were tasked with manually monitoring player
behavior.
• Rules-based reports generated suspect lists, which
were in turn reviewed by game play experts.
• Many things were tried; every time, the bad guys simply
adjusted their activities to get around the systems
created to detect them.
NO IDEA OF SIZE/SCOPE
BY THE TIME WE WERE ENGAGED, CRIMINALS HAD A 24-MONTH
ADVANTAGE
• Panopticon Labs was tasked with determining the size
and scope of gray market activities operating in-game.
• Behavioral analytics models were built to model 100%
of all player activities over a 90-day period of time.
• First pass: 88% accuracy rate. Second pass: 98.7%
accuracy rate.
• Thousands of bad actors were participating every month
in a complex ecosystem.
40% REVENUE
LOSS
PANOPTICON LABS ESTIMATED THAT 40% OF
THE PUBLISHER’S MONTHLY REVENUE WAS
BEING LOST DIRECTLY TO THE GRAY MARKET
THIS WAS ON TOP OF THE LOSS FROM
REPUTATIONAL DAMAGE, EARLY PLAYER
CANCELATIONS, AND LOSS OF CONVERSION.
RECOMMENDATIONS
TECHNOLOGY
BE LIKE BANKS; EMPLOY A ‘LAYERED’ SOLUTION THAT
UTILIZED ANALYTICS WITH TRADITIONAL CONTROLS
1. Recognize that any observable system is porous
when faced with a dedicated attacker.
2. Be skeptical of results; make sure the right things
are being measured.
3. Measure early; measure often.
4. Assume the bad guys are already inside.
ANALYTICS
MORE THAN JUST A BUZZ WORD
1. Study good and bad events - not all anomalies are
created equal).
2. Classify ‘anomalies’ differently than ‘suspects’ -
understand how publishers can make best use of these
data elements.
3. Intelligence is useless unless paired with timely and
efficient action.
GAMING REALITIES
GAMES HAVE VERY DIFFERENT NEEDS THAN MOST OTHER INDUSTRIES
1. Games are very sensitive to lag – don’t expect to be
embedded in the client OR the server.
2. Game developers hate overhead – if your tools
require changes to the game itself, they probably won’t
be used, or will be abandoned early-on.
3. Games are constantly changing – unlike banking,
retail, manufacturing, or eCommerce, games radically
change over time by design.
ANOMALY
DETECTION
DEFINITION
“Anomaly detection (or outlier
detection) is the identification of
items, events or observations
which do not conform to an
expected pattern or other items in
a dataset.”
- Wikipedia
WHY ANOMALY
DETECTION?
Rules are expensive – both to set up as well as to
maintain.
Rules are slow – must be manually maintained and
changed as player – and fraudster – behavior changes
over time.
Rules are reactive – by definition, rules can only be
created as a reaction to something bad that’s already
happened.
THE HUMAN FACTOR
HUMAN BEINGS ARE THE BEST PATTERN RECOGNITION
“Our support team knows our players
better than anyone, and can usually tell
right away exactly what’s happening;
they just need to know which players
and events to look at first.”
–Every Operations Executive Ever
WATCHTOWER
WATCHTOWER is Panopticon
Laboratories’ premier in-game security
product, using proprietary anomaly
detection and behavioral analytics to
provide online video game publishers
with a 360° overview of player behavior
over time. The SaaS-based product’s
real-time, actionable alerts and research
tools allow analysts to make quick and
informed decisions that stop malicious
in-game behavior before damages can
occur. Its powerful machine learning
system enables the engine to grow
smarter and more powerful
over time.
PROVIDING A 360° VIEW OF PLAYER BEHAVIOR
PROTECTING ONLINE GAMES
FROM IN-GAME THREATS.
MATTHEW COOK
CO-FOUNDER
matt@panopticonlabs.com
614.580.7003

More Related Content

More from centralohioissa

Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50centralohioissa
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...centralohioissa
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...centralohioissa
 

More from centralohioissa (20)

Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Matthew Cook - How Fraudsters Are 'Following the Money' Into Online Games

  • 1. PANOPTICON LABORATORIES How Fraudsters Are ‘Following The Money’ Into Online Games www.panopticonlabs.com March xx, 2016
  • 2. Screenshot of Watchtower UI PANOPTICON LABORATORIES is the first and only in-video game cybersecurity company, built to protect online video game publishers from the financial and reputational damages that can result from cyber attack. Through proprietary technology that is uniquely focused on gameplay itself, Panopticon sets a baseline of activity for every player who participates in online play. Upon discovering anomalous behavior, Panopticon alerts publishers with more than 99% accuracy, along with providing recommendations for incident investigation and immediate remediation. ABOUT US PROTECTING ONLINE GAMES FROM IN-GAME THREATS
  • 3. WHT DOES GAME FRAUD LOOK LIKE?
  • 4.
  • 5. FRAUDSTERS = WORLD KILLERS Hackers, cheaters, and fraudsters are a cancer that kills virtual worlds.
  • 6. increase in account takeover Steam Trading allows players to exchange virtual items. accounts are hacked every month
  • 7. • Cheap – Only $30 gets script kiddies source code, manuals, and tutorial videos. • Effective – uses state of the art obfuscation techniques, rendering it invisible to most AV. • Evolving – leaked source code has lead to a development arms war. • Defeats Multifactor – Kaspersky has shown that Steam Stealers can neutralize Steam’s primary defense against unauthorized trades. NEW MALWARE: “STEAM STEALER”
  • 8. MONEY IN GAMES The evolving video game business model:
  • 9.
  • 10. Online games generated In 2015. WHY FRAUD? Global movie box office .
  • 11. It was true in banking. It was true in eCommerce. Now it’s happening in video games.
  • 13. MORE THAN ACCOUNT TAKEOVER Gold Farming Botting Credit Card Fraud
  • 14. WHAT’S NEEDED? WHEN SURVEYED, GAME PUBLISHERS AND DEVELOPERS HAD VERY SPECIFIC IDEAS ABOUT WHAT THEY WANTED AND NEEEDED…
  • 15. SURVEY OF 50+ PUBLISHERS Over 18 months, online game publishers were asked: • What are you doing now to fight fraudsters, cheaters, and hackers? • How effective are those solutions? • What other solution(s) do you wish you had access to?
  • 16. COMMON SOLUTIONS MANY TOOLS WERE INITIALLY DEVELOPED FOR OTHER INDUSTRIES • Multi-factor, IP/GEO, Black/WhiteListing, challenge questions, and device fingerprinting and reputation tracking have all been attempted. • List-based solutions draw from years of institutional wisdom and databases. • “The problem with using tools built for banks to secure games is that bad guys have had years to figure out how to break them.”
  • 17. DIFFERENT GENRES; DIFFERENT PRIORITIES • MMO: Account Takeover • Free-To-Play: Account re-selling; gray markets • Social Casino: Cheating; collusion. • Real-Money Casino: Money laundering; cybercrime
  • 18. MOST-COMMON SOLUTION Many publishers create rules- based reports based on what has happened in the past. OBSERVE CONFIRM FORENSICS ADD RULES
  • 19. ALL AGREE: Lots of overlap – bad actors from across the spectrum are constantly looking for advantage. It should be addressed – even most aren’t exactly sure HOW to fight back. It’s about more than money – reputational damage, player dissatisfaction leading to churn, and premature shortening of the game’s life are also important.
  • 20. "One of the most important things you have as a developer is the community you can take with you."
  • 21. CASE STUDY HOW ONE LARGE, DATA-DRIVEN PUBLISHER FOUND ITSELF AT THE MERCY OF CYBERCRIMINALS DESPITE THE USE OF CUTING-EDGE TECHNOLOGY
  • 22. SOCIAL CASINO Players cannot cash-out chips; play in large, social settings through mobile and Facebook
  • 23. 13 MILLION PLAYERS HALF ON MOBILE; HALF CONNECTING VIA FACEBOOK • Had the advantage of Facebook’s authentication controls paired with Apple’s app-level validation tools and a variety of traditional front-end services. • Employed cutting-edge back-end transaction security controls via their credit card processor. • Very data-centric since the company was founded; prided itself on the quality – and quantity – of its player data.
  • 24. WORLD-WIDE COVERAGE EMPLOYED TEAMS AROUND THE GLOBE TO WATCH OUT FOR PLAYERS • As fraud and gray market losses mounted, more employees were tasked with manually monitoring player behavior. • Rules-based reports generated suspect lists, which were in turn reviewed by game play experts. • Many things were tried; every time, the bad guys simply adjusted their activities to get around the systems created to detect them.
  • 25. NO IDEA OF SIZE/SCOPE BY THE TIME WE WERE ENGAGED, CRIMINALS HAD A 24-MONTH ADVANTAGE • Panopticon Labs was tasked with determining the size and scope of gray market activities operating in-game. • Behavioral analytics models were built to model 100% of all player activities over a 90-day period of time. • First pass: 88% accuracy rate. Second pass: 98.7% accuracy rate. • Thousands of bad actors were participating every month in a complex ecosystem.
  • 26. 40% REVENUE LOSS PANOPTICON LABS ESTIMATED THAT 40% OF THE PUBLISHER’S MONTHLY REVENUE WAS BEING LOST DIRECTLY TO THE GRAY MARKET THIS WAS ON TOP OF THE LOSS FROM REPUTATIONAL DAMAGE, EARLY PLAYER CANCELATIONS, AND LOSS OF CONVERSION.
  • 28. TECHNOLOGY BE LIKE BANKS; EMPLOY A ‘LAYERED’ SOLUTION THAT UTILIZED ANALYTICS WITH TRADITIONAL CONTROLS 1. Recognize that any observable system is porous when faced with a dedicated attacker. 2. Be skeptical of results; make sure the right things are being measured. 3. Measure early; measure often. 4. Assume the bad guys are already inside.
  • 29. ANALYTICS MORE THAN JUST A BUZZ WORD 1. Study good and bad events - not all anomalies are created equal). 2. Classify ‘anomalies’ differently than ‘suspects’ - understand how publishers can make best use of these data elements. 3. Intelligence is useless unless paired with timely and efficient action.
  • 30. GAMING REALITIES GAMES HAVE VERY DIFFERENT NEEDS THAN MOST OTHER INDUSTRIES 1. Games are very sensitive to lag – don’t expect to be embedded in the client OR the server. 2. Game developers hate overhead – if your tools require changes to the game itself, they probably won’t be used, or will be abandoned early-on. 3. Games are constantly changing – unlike banking, retail, manufacturing, or eCommerce, games radically change over time by design.
  • 32. DEFINITION “Anomaly detection (or outlier detection) is the identification of items, events or observations which do not conform to an expected pattern or other items in a dataset.” - Wikipedia
  • 33. WHY ANOMALY DETECTION? Rules are expensive – both to set up as well as to maintain. Rules are slow – must be manually maintained and changed as player – and fraudster – behavior changes over time. Rules are reactive – by definition, rules can only be created as a reaction to something bad that’s already happened.
  • 34. THE HUMAN FACTOR HUMAN BEINGS ARE THE BEST PATTERN RECOGNITION “Our support team knows our players better than anyone, and can usually tell right away exactly what’s happening; they just need to know which players and events to look at first.” –Every Operations Executive Ever
  • 35. WATCHTOWER WATCHTOWER is Panopticon Laboratories’ premier in-game security product, using proprietary anomaly detection and behavioral analytics to provide online video game publishers with a 360° overview of player behavior over time. The SaaS-based product’s real-time, actionable alerts and research tools allow analysts to make quick and informed decisions that stop malicious in-game behavior before damages can occur. Its powerful machine learning system enables the engine to grow smarter and more powerful over time. PROVIDING A 360° VIEW OF PLAYER BEHAVIOR
  • 36. PROTECTING ONLINE GAMES FROM IN-GAME THREATS. MATTHEW COOK CO-FOUNDER matt@panopticonlabs.com 614.580.7003

Editor's Notes

  1. “The most common tool…” Explain the “Reporting Life Cycle” “”