Mortal Kombat 11 Devs Are Seeking Into Ongoing Threat Of DDoS Attacks


Screenshot: NetherRealm Studios

It is turn into clear to Mortal Kombat 11 players more than the final couple of weeks that the game’s on-line modes have some crucial vulnerabilities. Netplay competitors have been subjected to quite a few attacks, such as distributed denial of service (DDoS) targeting that tends to make matches unplayable and has apparently even exposed IP addresses, a specifically heinous issue that has led to at least a single streamer getting threatened by somebody who was capable to discover their dwelling address.

On the net competitors is a substantial draw of most modern day fighting games, and Mortal Kombat 11 has additional prioritized play with the current addition of Kombat League, a seasonal ranked mode that enables players to earn in-game rewards by finishing challenges in on-line matches. But, as is normally the case in on-line games, some customers have had run-ins with unscrupulous opponents who are cheating the method. In this case, the cheating entails employing third-celebration tools to make the game so unplayable that the other player is forced to disconnect and surrender ranking points to the hacker.

DDoS attacks are significant enterprise. The continuous, heavy stream of information and facts they send to servers can do something from slowing down to entirely knocking out web access. It is also not legal. Not too long ago, a man was sentenced to 27 months in jail and ordered to spend $95,000 in restitution for his element in a wave of DDoS attacks launched against Sony On the net Entertainment in between December 2013 and January 2014. The maximum charge for such an attack tops out at 10 years in prison and $250,000 in fines.

When it comes to Mortal Kombat 11, a player employing a DDoS attack can slow their opponent’s game to a crawl and can even boot players off the web completely. In a common video 1st covered by Eurogamer, YouTuber sikander555 shared footage of a player named pa3com supposedly initiating a DDoS attack on the character pick screen, forcing sikander555 out of the match with no even throwing a single punch. The video description claims that the pa3com account had at some point changed its name to Son-Goku-DZ, and according to Eurogamer, this account was at a single time climbing up the game’s leaderboards. A swift peek at the Mortal Kombat 11 leaderboards at the time of this writing shows that Son-Goku-DZ is no longer an Elder God, which is the highest rank in Kombat League, so some of this player’s fraudulent wins seem to have been removed from the account.

A substantially scarier incident played out on Twitch back in July when streamer BelowZer0 located himself on the other finish of an apparent doxing as properly as a DDoS threat from a defeated opponent. Upon defeating a player named Goddess0fBl00d23, BelowZer0 was inundated with threatening messages from them, a couple of of which purportedly incorporated proof that Goddess0fBl00d23 knew his dwelling address. Additional messages supplied by BelowZer0 show Goddess0fBl00d23 threatening to “fry” BelowZer0’s internet, a move that BelowZer0 mentioned was effective. Whilst it is unclear if Goddess0fBl00d23 was capable to acquire BelowZer0’s dwelling address with information and facts gleaned from Mortal Kombat 11 or basically by way of a bit of Google sleuthing, it does seem that anything about the game’s servers leaves players open to these varieties of attacks, a vulnerability that may perhaps have significant consequences in the actual planet.

NetherRealm Studios released a statement yesterday acknowledging these attacks and promising to “make use of all solutions available” to alleviate the situation. Whether or not this implies basically banning players who have been located to be involved in any DDoS incidents or truly fixing the vulnerabilities in the Mortal Kombat 11 servers is but to be observed, so players will certainly want to be cautious when they participate in on-line matches. Kotaku has reached out to NetherRealm Studios for additional comment about how the business intends to method this apparent vulnerability.


Latest posts