A widespread issue involving the unauthorized generation of “zel” – a premium in-game currency – has rocked the popular mobile game Lineage Classic, prompting accusations that NCSoft, the game’s developer, has failed to adequately secure its systems. The exploit, first reported by Korean gaming news outlets earlier this week, allows players to create unlimited amounts of zel, effectively undermining the game’s economy and pay-to-win mechanics.
NCSoft had previously assured players that Lineage Classic would avoid aggressive monetization strategies beyond a standard monthly subscription fee. This promise, although, has been called into question as the zel exploit allows players to bypass intended revenue streams. The company has yet to release a comprehensive statement detailing the extent of the problem or the steps being taken to rectify it.
The vulnerability appears to stem from a flaw in the game’s server-side code, allowing for the duplication of zel through a currently undisclosed method. Reports indicate the issue has been ongoing for several days, with numerous players exploiting the bug before it came to wider attention. Screenshots and videos circulating on Korean gaming forums purportedly demonstrate the ease with which players can generate vast quantities of the currency.
This incident arrives amidst a broader discussion regarding the ethical responsibilities of game developers and publishers. According to a report from AAF, a Senior Editor’s role is to uphold “rigorous standards of accuracy, consistency, and style,” a standard some players believe NCSoft has fallen short of in this instance. The lack of transparency surrounding the exploit and the delayed response have fueled criticism within the Lineage Classic community.
The situation is further complicated by NCSoft’s history with monetization practices in its Lineage franchise. Previous iterations of the game have been criticized for aggressive in-app purchases and pay-to-win elements. The initial pledge to avoid such tactics in Lineage Classic had been met with cautious optimism by players, making the current situation particularly damaging to the company’s reputation.
As of today, NCSoft has only acknowledged the issue in brief statements on its official forums, stating that it is “investigating the matter” and will provide updates “as soon as possible.” The company has not specified a timeline for resolving the exploit or compensating players who have been negatively impacted. The Council of Science Editors emphasizes the importance of editors establishing clear guidelines for handling ethical issues, a process that appears to be lagging in this case.
The incident also raises questions about the effectiveness of NCSoft’s security protocols and quality assurance testing. Experts at Arizona State University have noted that effective Senior Editors must make crucial editorial decisions that reflect a publication’s mission and values, and in this case, NCSoft’s values are being questioned.
The Journal of the Association for Information Systems published research in 2015 highlighting the responsibility of Senior Editors to determine the final disposition of papers submitted to their journal, and in this case, NCSoft must determine the final disposition of this security breach. The company has not yet announced any concrete steps to prevent similar exploits in the future.