Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

World of Warships Blitz Credential Leak

Cyberinchief by Cyberinchief
November 6, 2025
Reading Time: 4 mins read
0
Automate 80% of IT Tickets with Natural Language Workflows


RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

Author: Michal Rajčan

World of Warships Blitz is an online, multiplayer mobile app game where users assume control of different warships from the early- to mid- 20th century. Players can customize and improve their fleet from both points earned during gameplay and from in-app purchases. The Android version has more than 150,000 active users and 10 million app downloads.

Earlier this year, the Jamf Threat Labs team found that Wargaming’s mobile app game, World of Warships Blitz, was leaking player credentials. Both the Android and iOS versions were affected by this issue, but we have found no other game from the developer leaking any kind of data.

What did Jamf Threat Labs find?

Jamf Threat Labs observed and confirmed that the app leaks credentials via unencrypted communication to one specific domain during the login and registration phase. All other communication is happening via an encrypted channel; hence it does not leak any data.

Data leaked during several requests contain:

We can see effort to protect user data from compromise as it is not being sent in clear form, but such effort is short lived because of easy replay attacks. Such an attack relies on capturing legitimate traffic data and sending it again to the server. Even though credentials are obfuscated and not visible to the attacker, they can send a new request with obfuscated data and gain access to the account. Especially if session token cookie is also being leaked with the same request.

Buy JNews
ADVERTISEMENT

The data leak outlined above can be misused in replay attacks. According to the National Institute of Standards and Technology SP 800-63-4, a replay attack is, “An attack in which the attacker is able to replay previously captured messages between a legitimate claimant and a verifier to masquerade as that claimant to the verifier or vice versa.” For example (presuming no replay attack protections are in place), if a user logs in to their bank account, during a replay attack, the attacker records and resends that login request to repeat the action. With captured details of the login, they can send the message again to gain access to the victim’s account.

World of Warships response

The Jamf Threat Labs team contacted the developer in early August with our findings and based on our discussion agreed on a prolonged responsible disclosure period, giving them the requested time to fix the issue.

The developer was responsive and cooperative in regard to fixing the issue. The credentials leak was fixed in version 8.4.0.

How did we find the leak?

Jamf Threat Labs has set up different alerts to detect this data leak with threat prevention policy available in Jamf for Mobile.

One of our alerts was triggered while users were connecting to the game via the app. At this point, we detected potential leaks of their credentials.

Risks for the players

Personal risk comes in the form of an account takeover. As documented on the game creator’s website, users cannot transfer their funds to different accounts, but users can transfer items between their accounts are on different servers. While there are conditions that must be met to achieve this transfer, with access to a compromised account, an attacker can impersonate the user and transfer funds.

Another risk of attackers taking hold of an account is to halt a player’s progress in the form of spending their earned or purchased in-game currency into items and/or research which does not benefit their play. Subsequently, this risk might come in form of ransom if an attacker threatens the player with these steps unless a real-life payment is made.

Conclusion

While the leak we found above is not that of a “business application,” there are still steps organizations can take toward user awareness and cyber defense. For example, Jamf Threat Labs data shows that company email addresses are used for personal accounts. The good news is that this practice is declining, and the number of employees using work emails for personal reasons is minimal. To reduce business risk coming from apps outside of business use, organizations must educate users about proper password hygiene and email account usage.

Usually, data leaks are only the initial vector for a targeted phishing campaign. These types of campaigns are more sophisticated than run-of-the-mill phishing campaigns, and often, are more successful.

With previously collected information, attackers can focus on social engineering techniques on the user — who they work for, their interests, the apps they use — to further personalize a phishing (or other social engineering) attack.

For example, researchers at Google Threat Intelligence found attackers “deceiving victims into authorizing a malicious connected app to their organization’s Salesforce portal.” By tricking users to install a malicious Salesforce app, attackers gained access to the customer’s Salesforce account.

But there are other common reasons to pay attention to data leaks:

  • Even popular developers can make mistakes. In fact, according to NIST Special Publication 800-124r2, “In the case of typical software, errors and vulnerabilities exist at an estimated frequency of ~25 errors per 1000 lines of code.”

  • This leak reinforces the need for organizations and consumers to layer defense protection. Relying only on the security of the host app creates opportunities for attackers.

We appreciate the Wargaming team’s effort and collaboration during this process. While the specific vulnerability discussed above has now been patched, this post helps inform businesses and users about the types of threats and techniques attackers employ to steal data and sensitive information.



Source link

Tags: BlitzCredentialleakWarshipsWorld
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
Dark SECRET of INTERNET, Social Media & Cyber Crimes | Amit Dubey Exposes What No One Tells You

Dark SECRET of INTERNET, Social Media & Cyber Crimes | Amit Dubey Exposes What No One Tells You

Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Recommended Stories

Cyber Security Full course – 11 Hours | Cyber Security Training For Beginners | Edureka

Cyber Security Full course – 11 Hours | Cyber Security Training For Beginners | Edureka

October 14, 2025
Vuoi lavorare nella cybersecurity? Allora devi sapere questo. 15 anni di esperienza alle spalle!

Vuoi lavorare nella cybersecurity? Allora devi sapere questo. 15 anni di esperienza alle spalle!

November 8, 2025
Police Procedural: How South Carolina Arrest Records Were Exposed

Police Procedural: How South Carolina Arrest Records Were Exposed

October 19, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested