RIOT Security Analysis - Victor Ueki
RIOT Security Analysis - Victor Ueki
Security Analysis
By Victor Tagawa Ueki 72075098
System Analysis
Objective Requirements
- Providing both a Client and - Servers which host the games
Server for users to play the that are being played. (Possibly
game named “League of biggest expense)
Legends”. - Servers able to keep each
- Client serves as a save file for players personal information.
each users game statistics such (i.e. Email, DoB, in game name)
as past games and purchases. -
- The ability to communicate with
other users through client.
01
DDoS Attacks
Attacks purely focused on a single team.
SK Telecom T1
- Regarded as the best competitive League of Legends team with 5
total worlds championship (most prestigious tournament of the
game).
- All T1 players play, practice, and stream in T1’s headquarters located
in Gangnam.
- Since 2022 has fell victim to multiple cases of DDoS attacks still
prevailing until today.
- All members of the team are from South Korea. (Relevant to the case)
From Hackerone Report
Assets
What RIOT has implemented against Threats & Vulnerabilities
Key Affected Assets
Addition of RIOT’s
Source Code Anti-Cheat
On January 2023 RIOT had Since the addition of Vanguard on
suffered from a social engineer May 2024, T1 has still been
attack and had their source code affected. Thus the exploit
stolen. bypasses Vanguard.
Known
02 Location
T1 Headquarters location is well known to the
public providing a physical vulnerability.
Server Code
03 Vulnerability
Anti-Cheat called Demacia (Alleged flagged
cheaters would have their IP sent to RIOT).
Slow Company
04 Response
Only a year after the initial main DDoS attacks, RIOT
issued a 100,000 dollar bounty.
Proposal
Possible solution to T1’s DDoS issue
Changes to The System
Defacement SPAM
Once with the access of breached As the attacker does not have a
users profile they have free reign of high amount of risk by losing the
changing anything about the users account they hacked, spamming
profile without further verification. the friendlist could be done with
little to no drawbacks.
T1’s DDoS Vulnerabilities
There is a lack of authentication which is very
01 No F2A problimatic and also leads to many threats such
as Password Cracking.