Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Flight-Sim Devs Say Hidden Password-Dump Tool Was Used To Fight Pirates

Accepted submission by Arthur T Knackerbracket at 2018-02-20 08:08:07
Security

Story automatically generated by StoryBot Version 0.3.0a (Development).
Storybot ('Arthur T Knackerbracket') has been converted to Python3

Note: This is the complete story and will need further editing. It may also be covered by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [ArsTechnica] collected from rss-bot logs

Time: 2018-02-19 16:29:02 UTC

Original URL: https://arstechnica.com/gaming/2018/02/flight-sim-devs-say-hidden-password-dump-tool-was-used-to-fight-pirates/ [arstechnica.com] using UTF-8 encoding.

Title: Flight-Sim Devs Say Hidden Password-Dump Tool Was Used To Fight Pirates

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---

Flight-Sim Devs Say Hidden Password-Dump Tool Was Used To Fight Pirates

Arthur T Knackerbracket has found the following story [arstechnica.com]:

The usually staid world of professional-grade flight simulations was rocked by controversy over the weekend, with fans accusing mod developer FlightSimLabs (FSLabs) of distributing "malware" with an add-on package for Lockheed Martin's popular Prepar3d simulation [prepar3d.com]. The developer insists the hidden package was intended as an anti-piracy tool but has removed what it now acknowledges was a "heavy-handed" response to the threat of people stealing its add-on.

The controversy started Sunday when Reddit user crankyrecursion noticed [reddit.com] that FSLabs' Airbus A320-X add-on package [flightsimlabs.com] was setting off his antivirus scanner. FSLabs had already recommended users turn off their antivirus protection [flightsimlabs.com] when installing the add-on, so this wasn't an isolated issue.

The reason for the warning, as crankyrecursion found [reddit.com], was that the installer seemed to be extracting a "test.exe" file that matched a "Chrome Password Dump" tool that can be found online. As the name implies, that tool appears to extract passwords saved in the Chrome Web browser—not something you'd expect to find in a flight-sim add-on. The fact that the installer necessarily needs to run with enhanced permissions increased the security threat from the "Password Dump."

FSLabs head Lefteris Kalamaras responded to the uproar [flightsimlabs.com] over the discovery on the company's forums, arguing that the hidden file does not "reveal any sensitive information of any customer who has legitimately purchased our products" (emphasis in original). The file, he insists, is only activated if the installer sees a serial number that matches a database of pirated numbers found floating around on the Internet. "This method has already successfully provided information that we're going to use in our ongoing legal battles against such criminals," he wrote.

In a later update, Kalamaras acknowledges that some users were uncomfortable with "this particular method which might be considered to be a bit heavy-handed on our part." The company promptly released a new installer without the test.exe code included.

"Heavy handed" sounds like quite an understatement, though, given what we know. Kalamaras' statement heavily implies that the original installer did, in fact, attempt to obtain password information from users who installed a product they suspected of being pirated (note the specific language that only "legitimate" users didn't have to worry about their sensitive information being revealed). Whatever your feelings on the ethical and practical implications of piracy, this level of extreme countermeasure is practically unheard of in the PC gaming scene.

We've reached out to FlightSimLabs for comment and will update if and when we hear back.


Original Submission