When I spoke to Manfred ahead of his talk at the Def Con hacking conference, he said he wanted to go in, give his demo, and go out "as a ghost," never to be seen or heard from again. He said he wanted to be "invisible," just like he's been for the past two decades. He said he's found more than 100 publicly unknown vulnerabilities in more than 20 online video games, making hacking and trading virtual goods into his full time job.Unlike most video game hackers, Manfred didn't cheat to gain an advantage over his opponents. He hacked games because he made it his living."The best hacks are the invisible ones because you change the rules without anyone knowing what's going on," Manfred told me. "When hacking online games, the main goal is to be invisible. You don't want to disrupt the players, you don't want the game company to find out about your hacks. You don't even want them to know that what you're doing is possible.""The best hacks are the invisible ones because you change the rules without anyone knowing what's going on."
On Saturday, Manfred came out of the shadows and told his story for the first time during his talk. Initially, his plan was to hack WildStar Online in front of the audience, abusing undisclosed vulnerabilities, or zero-days, without having his talk recorded. The conference organizers, however, told him that all talks have to be recorded, and so he didn't do the hack live—much to the audience's chagrin.Read more: The Mystery of the Creepiest Television Hack
A screenshot of WildStar. Image: NCSOFT
A screenshot of Manfred, who's the character wearing all purple, playing Ultima Online after he stole a house. (Image: Manfred)
Most of the time, the hacks went largely unnoticed. The one exception was Shadowbane. That game, Manfred says, was so easy to hack—hackers could just send the game's servers whatever data they wanted and the game trusted it—that the chaos created by him and other hackers was reported in a Wired story in 2003."That was my last malicious hack," Manfred said. "Then I went totally underground and made sure my hacks weren't noticed by anybody.""I don't like to call them hacks. It's more like finding unintended features in the protocol."
Get six of our favorite Motherboard stories every day by signing up for our newsletter.Got a tip? You can contact this reporter securely on Signal at +1 917 257 1382, OTR chat at lorenzo@jabber.ccc.de, or email lorenzo@motherboard.tv
