EA Games site hacked to steal Apple IDs

The attackers sought credentials and other personal information through a phishing scheme, researchers said

A phished Apple login site on EA.com.

A phished Apple login site on EA.com.

An Electronic Arts website was hacked in a phishing scheme aimed at the acquisition of Apple IDs and credit card numbers, security researchers reported Wednesday.

Security vulnerabilities in a calendar application are probably what enabled attackers to compromise an EA server and create a phishing site designed to look like an Apple login page, said researchers at Netcraft, a U.K.-based security services company, in a blog post.

The site looked legitimate. "My Apple ID" appeared at the top, underneath a toolbar with links to various Apple services such as iTunes and Apple's online store. The site asked people to sign in to verify their Apple ID, seeking their Apple ID and password. A second form then asked for the person's full name, credit card number, date of birth, phone number and other information. After submitting those details, people were directed to Apple's actual ID site, Netcraft said.

The security company alerted EA to the problem on Tuesday and it has since blocked access to the site, Netcraft said.

"We are making sure such attempts are no longer possible," an EA spokesman said.

EA did not say how many people, if any, were tricked into submitting their Apple IDs and other information on EA's site. EA is a large company that develops and publishes a range of video game titles, including "Madden NFL," "The Sims" and "Need for Speed."

The company is generally not associated with Apple, making it a curious candidate for hackers seeking Apple IDs. Through the attack, the hacker installed code on EA's server, Netcraft said, probably to view the contents of EA's calendar application as well as other source code and data.

The attacker may have used the calendar's vulnerabilities as an entryway to go deeper into EA's network. "The mere presence of old software can often provide sufficient incentive for a hacker to target one system over another, and to spend more time looking for additional vulnerabilities or trying to probe deeper into the internal network," Netcraft said.

EA's servers came under attack earlier this year under a separate attack targeting users of its Origin distribution software, the security company noted.

Netcraft did not say who might have been behind the attack, or what other data might have been accessed. It didn't immediately respond to requests for more information.

Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach's e-mail address is zach_miners@idg.com

Join the CSO newsletter!

Error: Please check your email address.

Tags Internet-based applications and servicessecurityNetcraftdata breachscamsEA GamesIdentity fraud / theftinternetdata protectionprivacyApple

More about AppleElectronic Arts AustraliaIDGNetcraftOriginSpeed

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Zach Miners

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts