Your Account Is Being Watched: New Activity Checks at Every Login
Posted: 12 Dec 2025
Anthropic CEO Dario Amodei’s warning about AI enabling “new kinds of cyberattacks” lands in the gaming world now that automated tools break into accounts three times faster than two years ago.
Traffic records from November 2025 showed login attacks jumping into the tens of billions during big sales weekends, and gaming platforms saw bots pass through older checks almost exactly like real players. Player accounts stopped being the focus; the systems surrounding them became part of the plan as well.
More than 26 billion automated attempts hit online services every month, usually aiming at profiles with saved cards, wallets, or anything tradable. A leveled Fortnite account might sell for $200 to $250 on underground markets, CS skins can go for thousands, not to mention digital art that trades for real money.
With the AI scam economy now above $12 trillion, more attention was inevitable. Hackers pulled $35 billion from online crimes in 2025, according to FBI data, a 40% jump from the year before, so the login stage turned into the first serious checkpoint for every player.
Old Password Habits Power Most Account Takeovers
Since players keep reusing passwords all over the internet, hackers take passwords from previous leaks and let bots test those combinations on Steam, PlayStation Network, Xbox Live, etc. Even a tiny success rate of 0.2-2% works in their favor, because the bots run through millions of logins for free.
Kaspersky reported 5.7 million Steam accounts taken over by infostealer malware in 2024, and another 6.2 million stolen from Epic Games Store, Battle.net, Ubisoft Connect, and EA App.
Some games now link inventories to shops where skins and upgrades get traded in seconds, so a hacked profile can also move items between platforms without the owner noticing. New safety updates focus on those transfers, especially in titles that use wallets and blockchain features to prove ownership.
Linked accounts deepen the fallout. A breach in a chat app, launcher, or companion service can spill into game libraries, inventories, payment vaults, and cloud saves because players link everything for convenience. One weak token can unlock five different platforms.
Crypto gaming pulled in more than $310 million this year, and DappRadar put the whole segment at around $26 billion.
More than half of new projects now use DAOs, which means players can vote on updates instead of waiting for studio decisions. While many of these tokens remain under the radar before public listings, they often surface on platforms like the best crypto gambling sites, where early users stay ahead of trends and react quickly to market shifts.
Ongoing trials inside big publishers show a widening split between teams that have already refined their token economics and those still searching for workable frameworks. Ubisoft’s tests with Might and Magic Fates and MapleStory’s token rewards are the clearest examples of how fast these ideas are moving into mainstream titles.
But this same financial opportunity also brings new targets. Group-IB even reported cases where attackers used deepfake video calls to slip malware onto employee PCs and empty every wallet they had open. Studios are already testing extra approval steps for transactions, along with other checks that do not slow down normal play.
When profiles tie directly into live balances, a single compromised session can drain value before you notice anything shifted. Platforms responded by watching behavior as closely as credentials, since breaches rarely begin with a bad password anymore.
Machine Learning Reads Your Gameplay Patterns with Keystroke-Level Precision
Gaming platforms now measure how fast someone moves through menus, which buttons get pressed during the play, and even the exact timing between clicks when buying something from a shop. That ends up as a complete online ID built from thousands of micro-behaviors that bots still fail to mimic convincingly.
Anodot’s anomaly-detection engine already scans millions of gameplay metrics every day and calculates behavior patterns to flag anything that doesn't match, cutting false alarms by almost 95%.
When someone who normally struggles with puzzles suddenly speeds through them, or if a session from New York reappears in Moscow within minutes, the system flags it instantly. Smartico.ai uses machine learning to predict lifetime value and player churn, letting platforms spot behavior changes before patterns become obvious.
Their accuracy rates put most predictions within forecast bounds, which means fewer false positives kick out real players while actual threats get stopped faster.
EA gathers every button press, movement, and choice through its telemetry system, getting insights into engagement patterns and bug fixes before the next patches. With machine learning algorithms, they can predict player preferences to make new game modes and different features for each player.
Valve's Anti-Cheat system works the same way – analyzing gameplay data to find cheating patterns and automatically banning the suspect. Models trained on huge datasets of legitimate and illegitimate gameplay can easily detect subtle patterns that older systems would miss.
The same idea powers most streaming platforms. Netflix uses such techniques, creating over 2,000 taste communities for targeted content recommendations, while Spotify's Discover Weekly has an 80% listen-through rate with behavioral analytics.
Security teams say many studios still run red-team drills only a few times a year, usually during quiet release windows, which leaves long stretches where new exploit paths go untested.
Two-Factor Authentication Is Now the Lowest Bar for Account Protection
Microsoft gets hit with over 1,000 password attacks per second, but more than 99.9% of compromised accounts didn't have MFA enabled. That single stat explains why platforms need all those extra verification steps.
The MFA market is heading toward $83 billion by 2034, and big tech companies have adopted it at rates above 87%, which makes sense given how often they get attacked. Small gaming studios are way behind – only 27% of teams under 25 people use MFA, compared to 87% of companies with over 10,000 employees.
That gap creates a serious problem because hackers specifically target the weakest links, and small studios running popular indie games often have the worst security.
The user side tells the same story – about 73% of people prefer using their smartphones for authentication, which pushed mobile-first platforms to integrate MFA features faster. But there's the catch: around one-third of consumers avoid MFA because they find it annoying, and 62% of small to mid-sized firms skip it entirely.
Gaming platforms are between two fires – lock things down too hard and players leave, keep it too loose and info gets uncovered. AI is making this smarter, though – by 2027, 40% of these systems will learn your normal patterns and only interrupt when something's actually wrong.
The method people actually use matters even more – authenticator apps handle 57.8% of global MFA adoption because they work offline and can't be intercepted. But SMS-based codes still take 56% of the market despite known vulnerabilities where attackers intercept texts through mobile networks.
People keep using SMS anyway because it's convenient – you don't need to install an app or remember another password. Push notifications sit at the top according to Okta, since they're fast and work on phones people already carry everywhere.
After years of chasing stronger codes and better prompts, the industry is finally moving toward something different: getting rid of passwords themselves.
Passkeys Are Everywhere – Except in Gaming
Gaming studios are still upgrading their login systems, but the rest of the internet has already moved on. Amazon rolled out passkeys to more than 175 million users, and Google, Apple, and Microsoft made them work across phones, PCs, and browsers without any setup drama.
More than 1 billion people activated at least one passkey according to the FIDO Alliance, and consumer awareness jumped from 39% to 57% in just two years. Almost every major service now supports passkey sign-ins, and many users already rely on them every day. Logins finish in a few seconds, succeed far more often than text codes, and companies avoid the usual recovery friction that slows down password-based systems.
Passkeys changed the rhythm of sign-ins – most sessions finish in 8.5 seconds compared to email verification or SMS codes that take over 30 seconds. They also hit a 93% success rate compared to 63% for older models, meaning fewer failed login attempts and less frustration.
After switching to passkeys, the reset backlog dropped almost overnight. And that cut operational cost in a way the finance teams could quantify – less IT staff time wasted on routine account recovery and more resources available for actual security work.
Microsoft made passkeys the default sign-in for all new accounts in May 2025, producing a 120% jump in authentications almost immediately.
Exchanges moved early – Coinbase, Binance, and Kraken all rank in the top 20 for passkey usage, as high-value targets won’t rely on passwords when users hold assets worth thousands or millions. Gemini went further and made passkeys mandatory for all users – one of the first big platforms to completely drop passwords.
That move produced a 269% rise in authentications and proved mandatory adoption works if you explain the benefits clearly.
Gaming hasn’t kept pace, but it won’t stay that way for long. Players with Steam accounts that have rare and valuable items started demanding better security after watching friends lose everything to AI phishing attacks. The platforms that implement passkeys first will have a competitive advantage, especially as younger players raised on biometric phone unlocking see old-school passwords as outdated friction.
Passkeys will reach gaming either way; the open question is which platforms make the jump before the next wave of takeovers. And even platforms preparing for passwordless logins hit a ceiling once credentials are no longer the prize.
Session Hijacking Bypasses Everything – Even MFA and Passkeys
Passwords aren’t the only weak point anymore – even if you enable MFA and use strong passwords, attackers can find a way around it by stealing your active session instead of your credentials.
Researchers found nearly 94 billion web browser cookies on the dark web in 2025, a 74% jump from the previous year. It's thought that 20% of stolen cookies are still active, tied to ongoing browser sessions – hundreds of millions of potential account hijacks just waiting to happen.
These cookies have tokens or session IDs that tell websites you've already passed the checks. If someone gets your session token, they can see everything – no password or 2FA needed. Microsoft caught 147,000 of these token replay attacks last year, more than double the year before.
Hackers set up fake proxy sites that capture your login info and session tokens as you think you're logging into the real platform. Plus, infostealers malware that targets browser data and extracts all cookies from your device. Both methods take typical credentials and session cookies at the same time, practically getting access whether you have MFA enabled or not.
A recent Stake study found 31% of e-commerce applications are targets of session hijacking, and gaming platforms face the same risks. After a session token slips into the wrong hands, the attacker inherits every permission tied to your account – purchases, personal data access, even linked financial activity.
Studios fight back by killing suspect sessions right away and use centralized systems to revoke tokens. If a player triggers an infostealer alert, killing all active sessions for their accounts forces fresh authentication and can stop silent cookie-based hijacks before damage occurs.
Some platforms made sessions expire faster to limit the damage if tokens get stolen, but in that case, players have to log back in more often.
Zero Trust Architecture Finally Arrives – Because the Old Perimeter Model Died
The rise of online hijacks and the collapse of password-centric defenses pushed security teams toward a new solution. The old security model worked like this: there's a perimeter like a firewall, inside is safe, outside is dangerous. But modern games now run through cloud servers, mobile clients, and connect to many different services. There's no perimeter anymore, which means the old model doesn't work.
Zero Trust works on the idea that nobody gets trust by default, even if they're inside the network. Every request or transaction gets verified. This means multi-factor authentication for access to critical systems, end-to-end encryption of all data, and constant activity monitoring.
Even after a player gets access, checks continue to prevent authenticated users from going rogue.
Gartner found 63% of organizations worldwide implemented some kind of zero-trust strategy, either fully or partially. Of those with zero trust in place, 79% have strategic metrics to track progress, and 89% of those also have risk metrics to measure actual security improvements.
Tech companies lead in zero trust adoption, but gaming companies are catching up fast because they face the same threats as financial platforms – real money moving through accounts that hackers desperately want to steal.
The practical implementation looks like this: packet-based mitigation solutions sit between edge routers and firewalls, separating good and malicious traffic by applying zero trust principles. For gaming operators, there's an extra requirement – making sure validation measures don't hurt user experience and happen in real-time.
The checks run in the background at match speed, since any visible delay breaks competitive flow. Cyber insurers already factor Zero Trust maturity into premium pricing, which pushed many studios to accelerate deployments. Blizzard felt this firsthand when tournaments went offline in minutes. After the 2020 DDoS attacks, they got hit again in April 2025. Each outage translated into lost matches and revenue.
Zero trust helps prevent this by constantly checking every connection with multiple security layers, even after login. Insurers report that firms running full Zero Trust reviews see incident lifetimes cut by more than half, which is why the framework is turning into a requirement.
In that environment, the old model stops working the moment attackers show up.
Server-Level Breaches Become the Real Prize Once Logins Get Harder
As login defenses stabilize, attackers shift their attention to the systems running behind them. Cloud stacks have hundreds of moving parts – matchmaking servers, inventory databases, payment processors, anti-cheat systems, regional routing... Each one is a potential way in.
Rather than wasting time with individual accounts, attackers now scan for vulnerabilities in the servers themselves: exposed APIs, outdated containers, unsecured dev environments. Only this year, attacks on backend admin consoles jumped over 60%, mostly from configurations someone left open by mistake.
Gaming engines face similar pressure. Unity confirmed multiple attempts to break into its package registry last year, and security teams across Unreal-based studios reported a surge in supply-chain probes aimed at modding tools and integration plugins.
None of these attacks targets players directly; the goal is to compromise the update channel itself so the attacker’s code rides into millions of machines through a trusted patch.
Cloud outages show the stakes clearly. When a major multiplayer title loses its login cluster or inventory database, everything freezes: in-progress matches, item trades, esports scrims, tournament qualifiers. Player drop-off spikes, refunds pile up, and sponsors pull back from events that cannot guarantee stable environments. Even the strongest account protections do little in those moments – one break and the in-game economy goes down with it.
Analysts expect that by 2028, outages triggered by infrastructure intrusions will exceed those caused by network floods, forcing studios to shift spending toward memory-safe services and automated isolation tools.
What Comes Next for Studios That Want to Stay Online
Threat reports from insurers and incident-response teams show a shift that gaming companies cannot ignore. In the past year, the time attackers can hide inside a system before getting caught dropped from 21 days to under 10 – automated tools now map out entire networks within hours of breaking in.
New rules in the EU and parts of Asia require gaming companies to prove who has access to what and report operational failures within hours. Cloud providers added their own requirements, pushing customers to adopt runtime workload protections that monitor container behavior frame by frame.
Studios that line up with these standards gain fewer blind spots and quicker detection windows, which is the only reliable way to keep online services steady while attackers test new methods every month.
Recent Articles
Join the community
We have a community with over 17,000+ smurfers and league players where we host weekly events, tournaments and giveaways.