Until Amazon can fix the problem.
Tag: exploit
New World Gold Dupe Halts Transfers
Steam: Devs Renaming Games With Keyword Spam
Something is going on with Steam developers.
Continue reading “Steam: Devs Renaming Games With Keyword Spam”
Z1BR Shuts Off Trading To Stop Dupes
People are playing Z1 Battle Royale enough to find a dupe exploit.
Old School RuneScape Sees Item Dupe Surface
Valve Surpasses $1 Million In Bug Bounties
Bless Unleashed Reopens Estate Servers After Exploit
Compensation extended to May 26.
Continue reading “Bless Unleashed Reopens Estate Servers After Exploit”
Temtem Clubs Cheaters: Almost 900 Permanently Banned
Temtem developer Crema today fired not so much a warning shot as a warning kill by announcing the ban of nearly 900 accounts from the newly launched MMO. All accounts in question have been permanently banned with no chance of appeal, with Crema stating their 100% confidence that each account has been caught cheating or abusing exploits.
We just completed our first batch of banned users. Almost 900 players have been permanently banned from Temtem.
Bans are final, we won’t answer or review any ban appeal. We’ve made 100% sure that every banned user is either a cheater or has abused exploits intentionally.
— Temtem (@PlayTemtem) February 3, 2020
https://platform.twitter.com/widgets.js
The statement that Crema won’t be reviewing any ban appeals had some members of the community concerned to say the least, as one could cite hundreds of examples of developers messing up and issuing false bans that are later overturned.
The team spent all morning checking banned accounts and player accounts saying “they didn’t do anything illegal”. We re-checked over 100 accounts.
Every single one of them was a legit ban.
— Temtem (@PlayTemtem) February 3, 2020
https://platform.twitter.com/widgets.js
Crema has since walked back their comment on a no appeals policy. Players who are banned and believe that it was out of error can appeal their ban by contacting Crema’s support email.
We’ve decided to review ban appeals, even though every single one of the ones we checked are legit. Like you said, having a “no appeal” policy is not good.
So, you can contact us on support@cremagames.com
Put “Ban appeal” as the subject and include your ingame ID or username.
— Temtem (@PlayTemtem) February 3, 2020
Bethesda Gives Proper Compensation To Fallout 76 Robbery Victims
It’s a new year and that means new second chances. Back over the winter holidays, Fallout 76 suffered a rather embarrassing exploit which allowed players to steal items from another person’s inventory effectively initiating a forced trade. It appears that Bethesda is finally making good on its promise of compensation.
This time around players are reporting that their inventories of lost items have been replaced along with a promised stipend of atoms. Bethesda’s remedy appears to be to clone a version of the player’s character from before the theft with the offer of a free service to transfer items from the cloned character to the non-cloned, presumably further progressed original character.
Source: Polygon via MassivelyOP
PSA: Update Windows 10 Right Now, NSA Posts Critical Vulnerability
You know a security issue is going to be a big problem when the National Security Agency is posting an APB for people to update their computers as soon as possible.
The United States Department of Defense has issued a critical security warning advising users of Windows 10 to ensure that their operating systems are up to date. The NSA identified a vulnerability that will allow malicious software to be installed on a machine by fooling Windows into thinking that it is an official update. The most up to date versions of Windows have allegedly patched this bug, and the department warns that it expects exploits to start cropping up in the very near future.
NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows®1 cryptographic functionality. The certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. The vulnerability affects Windows 10 and Windows Server 2016/2019 as well as applications that rely on Windows for trust functionality. Exploitation of the vulnerability allows attackers to defeat trusted network connections and deliver executable code while appearing as legitimately trusted entities. Examples where validation of trust may be impacted include:
- HTTPS connections
- Signed files and emails
- Signed executable code launched as user-mode processes
The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors. NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly and, if exploited, would render the previously mentioned platforms as fundamentally vulnerable. The consequences of not patching the vulnerability are severe and widespread. Remote exploitation tools will likely be made quickly and widely available. Rapid adoption of the patch is the only known mitigation at this time and should be the primary focus for all network owners.
Source: NSA