Online players as young as 10 are looking for their opponents delaying by breaking their computers with sophisticated malware that can penetrate the government, military and business computer networks.
International police that hit the world's most malicious software market has revealed dozens of cyber attackers in Australia, and in the past few months NSW sensors have scratched to track every user.
They were afraid that a great cyber attack was about to happen.
But what was found was dozens of children, who had downloaded the malware – in some cases bought it with a parent credit card – to refuse to dial on opponents in the online gaming world that would beat.
Although most of the users, between 10 and 31 years old when the police had spoken to them were aware of how dangerous the malware was, one teen claimed to use it to try to hack it into the computer system of its secondary school.
Detective has identified 41 people in the US who used the malware and they are all visiting them personally.
They have issued a strict warning for parents to keep closer look at their children's online activity, saying that the results could have been much worse if the malware fell into the wrong hands.
"We were fortunate that the use of this software in Australia is mainly used by children trying to disturb an online gaming objector," said Assistant Commissioner for State Crime Management, Stuart Smith.
"It's just as practical as that in the wrong hands – and with a co-ordinated purpose – it could have been used to attack systems with sensitive or secure information, such as banking, government, or even military."
Last year, the UK National Crime Authority went away from the Dutch police for a server associated with webstresser.org – the most popular source of denial assault (DDoS) – in the Netherlands.
DDoS malware attacks allow a user to incorporate a computer system or other website and slow down to the unexpired point, or completely throw out the offline user.
I'm commonly used in online gaming as a repayment form to an opponent.
In NSW, the police found that gamers buy malware and attack winning opponents as a secret form when playing the extremely popular shooter game, Fortnite.
In April 2018, Operation Power Off closes webstresser.org and site administrators were arrested in Canada, Serbia, Croatia and the UK.
Law enforcement found that over 150,000 people have registered to use malware and maintain more than 6 million cyber attacks, including targeting police forces, institutions, government and banks.
The IP addresses were sent to Australia to the Federal Police of Australia, which pointed out that most cyber assaults live in NSW.
Since September, the NSW Cybercrime Squad has been tracking the people behind IP addresses.
They found that the majority of teenagers, including a number of people living at home with their parents and had no idea to share a system through DDoS were an offense.
In one case, a 14-year-old boy from Tamworth used the malware to take 483 DoS attacks against other gamers in one month.
A convicted sex offender was also identified as one of the users. His home in the Western Isles was challenged and was accused of illegal impairment of electronic communication.
To date, detectives have issued eight warnings for young people under the Young Offenders Act, operating four search warrants and 25 people who were the registered users of malicious software were spoken.
"The future does not allow technology and cyber-time – they are here and now," said Mr Smith.
"So we need to keep our finger on the pulse and quickly identify, steer, and overcome challenges."