Incident: Blizzard Entertainment's Battle.net Hacked, User Data Compromised.

Published Date: 2012-08-10

Postmortem Analysis
Timeline 1. The software failure incident, where Blizzard Entertainment was hacked, happened on 4 August [13902].
System 1. Battle.net online accounts system [13902] 2. Password encryption system used by Blizzard Entertainment [13902] 3. Data reset or password change system including secret questions and answers [13902]
Responsible Organization 1. Hackers [13902]
Impacted Organization 1. Players of Blizzard Entertainment's online games such as Diablo, World of Warcraft, and Starcraft [13902].
Software Causes 1. The software cause of the failure incident was a hack that compromised Blizzard Entertainment's systems, leading to unauthorized access to player data such as email addresses, answers to security questions, and encrypted passwords [13902].
Non-software Causes 1. Lack of tight security measures in place to prevent cybercriminal infiltration [13902] 2. Delay in announcing the hack to users due to the time taken to investigate and understand the extent of the breach [13902]
Impacts 1. Millions of players of Blizzard Entertainment's online games were warned to change their passwords after the hack, affecting a significant number of accounts [13902]. 2. Hackers were able to access data such as email addresses and answers to players' personal security questions, potentially compromising user information [13902]. 3. The incident led to concerns about phishing emails that could trick users into revealing sensitive information [13902]. 4. Blizzard recommended that players change their passwords and closely monitor their online accounts, indicating a loss of trust and security in the system [13902]. 5. The hack highlighted the importance of regular testing, external audit, and continually updating security measures to combat cyber threats effectively [13902].
Preventions 1. Implementing multi-factor authentication could have prevented the software failure incident by adding an extra layer of security beyond passwords, making it harder for hackers to gain unauthorized access [13902]. 2. Regularly conducting security audits and penetration testing to identify and address vulnerabilities in the system could have helped prevent the hack [13902]. 3. Enhancing monitoring and detection capabilities to quickly identify and respond to any suspicious activities within the network could have potentially prevented the intrusion [13902]. 4. Educating users about cybersecurity best practices, such as avoiding phishing emails and using unique and strong passwords, could have reduced the risk of accounts being compromised [13902].
Fixes 1. Implementing stronger security measures such as multi-factor authentication to enhance the protection of user accounts and data [13902]. 2. Conducting regular security audits and external testing to identify vulnerabilities and ensure the effectiveness of security measures [13902]. 3. Enhancing encryption methods and techniques to safeguard sensitive information, including passwords and personal security questions [13902]. 4. Educating users about phishing emails and advising them to be cautious of suspicious communications requesting password resets or personal information [13902]. 5. Promptly notifying users about security breaches and taking immediate action to secure the network and investigate the incident thoroughly [13902].
References 1. Blizzard Entertainment 2. NCC Group 3. Activision Blizzard Inc 4. Rob Cotton 5. Battle.net users 6. Online games companies

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: Blizzard Entertainment, the company behind popular online games like Diablo, World of Warcraft, and Starcraft, experienced a hack where hackers were able to access data such as email addresses, personal security questions, and encrypted versions of passwords. This incident led to the company recommending users to change their passwords and be cautious of phishing emails. The company also mentioned that the hackers may have gained access to data used to reset or change passwords, including secret questions and answers [13902]. (b) The software failure incident having happened again at multiple_organization: The article mentions that the hack on Blizzard Entertainment is part of a growing list of incidents where companies holding millions of accounts have seen their databases compromised. This indicates that similar incidents have occurred at other organizations as well, where hackers target databases containing user information like usernames, emails, passwords, and payment details. The article highlights that online games companies are increasingly becoming targets for hacking attacks due to the valuable user data they possess [13902].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where Blizzard Entertainment's systems were hacked, leading to unauthorized access to data such as email addresses, answers to security questions, and encrypted passwords [13902]. This breach highlights a failure in the design of the system's security measures, despite Blizzard using encryption methods like "salting" to protect passwords. The incident underscores the importance of continuously updating security measures and conducting regular testing to stay ahead of cyber threats. (b) The software failure incident related to the operation phase is evident in the article as Blizzard urged its users to change their passwords and be cautious of phishing emails that might attempt to trick them into revealing sensitive information [13902]. This highlights a failure in the operation of the system, as users were potentially exposed to risks due to the hack. Additionally, the company advised users to log in directly on the site using a bookmark to avoid falling victim to phishing attempts, emphasizing the importance of proper operation and user behavior in maintaining system security.
Boundary (Internal/External) within_system (a) within_system: The software failure incident reported in the article is primarily due to factors originating from within the system. Blizzard Entertainment's systems were hacked, leading to unauthorized access to player data such as email addresses, answers to security questions, and encrypted passwords [13902]. The company had to take measures such as recommending password changes, updating security systems, and closely monitoring online accounts to address the breach. Additionally, the incident highlighted the importance of regular testing, external audits, and continually updating security measures to combat cyber threats effectively [13902]. (b) outside_system: The software failure incident does not seem to be primarily attributed to factors originating from outside the system. The article does not mention any external factors such as external attacks or environmental issues contributing significantly to the hack on Blizzard Entertainment's systems.
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically a hack on Blizzard Entertainment's systems. Hackers were able to access data such as email addresses, answers to security questions, and encrypted versions of passwords [13902]. (b) Human actions also played a role in this incident as Blizzard Entertainment had to take actions such as recommending users to change their passwords, urging the community to monitor their online accounts closely, and carrying out a security audit to assess the extent of the hack [13902].
Dimension (Hardware/Software) software (a) The software failure incident reported in the article was not due to hardware issues but rather due to a hack on Blizzard Entertainment's systems. The hackers were able to access data such as email addresses, answers to security questions, and encrypted versions of passwords. Blizzard took action to secure its network and recommended users to change their passwords as a precaution [13902]. (b) The software failure incident was primarily due to a hack on Blizzard Entertainment's systems, indicating a failure originating in software security measures. The hackers were able to access sensitive data like email addresses, security question answers, and encrypted passwords. Blizzard responded by recommending users to change their passwords and enhancing their security systems [13902].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident reported in Article 13902 is malicious in nature. The incident involved a hack on Blizzard Entertainment's systems, where intruders were able to access data such as email addresses, answers to personal security questions, and encrypted versions of passwords. The hackers potentially gained access to data used to reset or change passwords, including secret questions and answers. This breach was a deliberate attempt to infiltrate the system and compromise user data, indicating malicious intent [13902].
Intent (Poor/Accidental Decisions) unknown The software failure incident reported in Article 13902 was primarily due to poor decisions made by the company. Blizzard Entertainment was hacked, leading to the compromise of player data such as email addresses, personal security questions, and encrypted passwords. The incident highlighted the importance of regular testing, external audit, and continually updating security measures to combat cyber threats effectively. Despite having what they believed to be tight security measures in place, cyber criminals managed to infiltrate their systems, emphasizing the need for proactive security measures and transparency in response to such incidents [13902].
Capability (Incompetence/Accidental) accidental (a) The software failure incident reported in the articles is not related to development incompetence. The incident was a result of a hack on Blizzard Entertainment's systems, where hackers were able to access data such as email addresses, answers to security questions, and encrypted versions of passwords. Blizzard had implemented security measures like encryption and "salting" to protect passwords, but the hackers still managed to infiltrate the systems [13902]. (b) The software failure incident can be categorized as accidental, as it was a result of hackers gaining unauthorized access to Blizzard Entertainment's systems. The company took immediate action upon discovering the hack, working to re-secure their network and inform their player base. The incident highlights the ongoing threat of cyber attacks faced by online gaming companies, emphasizing the importance of regular testing, external audits, and continually updating security measures to stay ahead of potential threats [13902].
Duration temporary (a) The software failure incident reported in the article is more of a temporary nature. Blizzard Entertainment's systems were hacked on 4 August, leading to unauthorized access to data such as email addresses, personal security questions, and encrypted passwords. As a response, the company urged users to change their passwords, recommended monitoring online accounts closely, and encouraged mobile users to update their software. Additionally, Blizzard conducted a security audit and took steps to secure its network and inform its player base about the incident. The company worked diligently to address the hack and improve its security systems to prevent future breaches [13902].
Behaviour other (a) crash: The software failure incident reported in the article does not involve a crash where the system loses state and does not perform any of its intended functions [13902]. (b) omission: The incident does not involve a failure due to the system omitting to perform its intended functions at an instance(s) [13902]. (c) timing: The incident does not involve a failure due to the system performing its intended functions correctly, but too late or too early [13902]. (d) value: The software failure incident does not involve a failure due to the system performing its intended functions incorrectly [13902]. (e) byzantine: The incident does not involve a failure due to the system behaving erroneously with inconsistent responses and interactions [13902]. (f) other: The behavior of the software failure incident in the article is related to a security breach caused by hackers gaining unauthorized access to user data, including email addresses, personal security questions, and encrypted passwords. This breach led to the recommendation for users to change their passwords and be cautious of phishing emails. The incident highlights the importance of cybersecurity measures and the potential risks associated with holding sensitive user information [13902].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure. Blizzard Entertainment's hack resulted in hackers gaining access to data such as email addresses, answers to personal security questions, and encrypted versions of passwords. While the company stated that there was no evidence of credit card information or billing addresses being acquired, the breach did impact users' personal information and data security [13902].
Domain entertainment (a) The software failure incident reported in the news article is related to the entertainment industry. Specifically, it affected millions of players of Blizzard Entertainment's online games such as Diablo, World of Warcraft, and Starcraft [13902].

Sources

Back to List