To initiate the attack, the player had to click on a malicious link emailed to them, which then gave the attacker access to the user’s “login token.” The attacker could then play as if they were the victim, as well as listen to the voice communications intended for the owner of the...