• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cyberpunk 2077 hacked data circulating online

Cyberpunk 2077 Hacked Data Circulating Online

You are here: Home / Latest Cyber Security Vulnerabilities / Cyberpunk 2077 Hacked Data Circulating Online
June 11, 2021

CD Projekt Red verified that personnel and activity-relevant facts appears to be floating about the cyber-underground, 4 months following a hack on the Witcher and Cyberpunk 2077 developer.

New details from the February hack of CD Projekt Purple, the videogame-advancement enterprise at the rear of Cyberpunk 2077 and the Witcher collection, is circulating on the internet.

Previously this yr, the enterprise suffered a ransomware attack in which a cyberattack team (believed by some to be the HelloKitty gang) “gained accessibility to our internal network, collected certain info belonging to CD PROJEKT Funds Team and remaining a ransom be aware,” the business mentioned at the time.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The ransomware also encrypted the company’s techniques, but CD Projekt Crimson was ready to restore every little thing from backup – leaving the genuine issue to be the stolen data.

Ransomware gangs have doubled down on the more and more popular “double-extortion” menace, indicating they will auction stolen information if victims do not pay. Quite a few also preserve “name and shame” weblogs – applied by operators to publish leaked info from victims that refused to send about a ransom.

And in fact, in the CD Projekt Pink ransom observe (also tweeted out), the cybercriminals claimed that they had “dumped total copies” of the supply code for Cyberpunk 2077, Gwent, the Witcher 3 and an “unreleased version” of the Witcher 3 and, stolen delicate corporate facts relating to accounting, administration, HR, trader relations, legal and extra.

“Source codes will be marketed or leaked online, and your paperwork will be sent to our contacts in gaming journalism,” in accordance to the notice, which went on to say that not having to pay up has an affect to the company’s community picture, inventory rate and trader assurance. The attackers claimed that the information and facts will expose how terribly the business is operate.

Now, four months later, the crooks seem to be building very good on their promise with regards to the information and facts. In an update posted late Thursday, CD Projekt Red reported that its security personnel “now have explanation to think that interior knowledge illegally attained through the attack is presently remaining circulated on the internet.”

It included that it is in the procedure of clarifying just which data is staying circulated, “though we consider it may include latest/previous employee and contractor information in addition to info linked to our games. Additionally, we cannot confirm regardless of whether or not the information concerned could have been manipulated or tampered with subsequent the breach.”

Crucial UPDATE

Browse extra: https://t.co/qd6sc5VF3I pic.twitter.com/kKi1GkIaLO

— CD PROJEKT Pink (@CDPROJEKTRED) June 10, 2021

The business added, “regardless of the authenticity of the data getting circulated — we will do anything in our energy to protect the privacy of our employees, as properly as all other concerned functions. We are committed and well prepared to choose action from events sharing the knowledge in question.”

Resource Code Was Formerly Auctioned

It should be famous that ransomware gang apparently previously created great on its assure to auction off the company’s data, when resource code for Cyberpunk 2077 and the aforementioned unreleased edition of the Witcher 3 was place up for sale in February on the well-known Russian-language underground discussion board “Exploit.”

It was bought a working day later on, and although cyber-scientists confirmed the auction’s existence, they were being not able to validate the quantity the ton sold for, or the veracity of what was currently being sold. The auction requested for $1 million opening bids.

Launch of the supply code would permit fans to develop video game hacks and accomplish all forms of “modding” (i.e., development of customized attributes) and jailbreaks and would be a reward to competition.

And, “if the attackers had been equipped to exfiltrate source code for the popular Cyberpunk 2077 and Witcher video games it could guide to more qualified exploit improvement aimed at a popular participant base,” reported Chris Clements, vice president of remedies architecture at Cerberus Sentinel reported at the time.

Download our exceptional Totally free Threatpost Insider E-book, “2021: The Evolution of Ransomware,” to aid hone your cyber-defense strategies towards this expanding scourge. We go further than the standing quo to uncover what’s future for ransomware and the connected rising threats. Get the whole tale and Down load the E-book now – on us!




Some components of this article are sourced from:
threatpost.com

Previous Post: «fbi still frowns on ransomware payments FBI still frowns on ransomware payments
Next Post: McDonald’s Suffers Data Breach Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.