24 June 2014 - 18:57

The Hunter Drop Hack - How to Protect Yourself

This is a PSA to our members about the drop hack and a suggestion how to protect yourself.
Dot Esports

You've probably heard about the hunter drop hack that people has been experiencing. We've confirmed the hack and we feel in order to protect yourself, you have to recognize when it's being set up and executed, so that you can disconnect and reconnect as soon as possible to save the match.

What does the hack do?

It causes your client to think that your opponent is taking a long time, so long that the rope will never show up and burn. In reality, the timer is still going and your opponent has ended their turn. But the hack makes you think your opponent is still taking their turn. By the time you realize to reconnect, the game will have been over by then since they will be a turn or two ahead of you.

How to recognize the hack?

We won't go into details on how to do the hack but this is how you will recognize that it's being executed.

  1. They will need to be playing Hunter.
  2. They need to have both Wild Pyromancerand Acolyte of Painin play (doesn't matter the order or when, both must be present).
  3. What sets off the drop hack, the last piece of puzzle, is when they play Tracking when both are in play.

Something about getting the tracking menu, and the Acolyte of Pain draw (taking damage from Wild Pyromancer's area of effect damage), causes your client to 'hang'. You won't see the Tracking card being played either.

So if you see a Hunter opponent, who has both Wild Pyromancer and Acolyte of Pain in play, it's highly recommended you disconnect and reconnect right then (unless they have no mana to cast Tracking). It will fix the infinite turn issue.

Why are you telling us this?

This drop hack is not easy to pull off - needing 3 cards, 2 of which to survive the board. And the hacker seriously comprises their deck when they tune it specifically for hacking. So learn to recognize the hack, protect yourself, and then steamroll the pathetic hackers.

More Articles From The OP