Back to home
Technology

Rockstar Games confirms it was hacked by malicious group — 'ShinyHunters' takes credit, gives until April 14 to pay ransom or it will release confidential data

Source

Tom's Hardware

Published

TL;DR

AI Generated

Rockstar Games has confirmed being hacked by the group "ShinyHunters," who are demanding a ransom by April 14 to prevent the release of confidential data. The group exploited Anodot to access Rockstar's Snowflake instances, potentially compromising corporate data. While Rockstar claims the stolen information is non-material and won't impact players, the threat of data exposure remains. ShinyHunters' tactics involve targeting companies through API keys and third-party integrations, posing a broader cybersecurity risk to businesses beyond Rockstar. If the ransom isn't paid, the group plans to make the stolen data public, potentially revealing internal company information.

Read Full Article

Similar Articles

Bluetooth tracker hidden in a postcard and mailed to a warship exposed its location — $5 gadget put a $585 million Dutch ship at risk for 24 hours

Bluetooth tracker hidden in a postcard and mailed to a warship exposed its location — $5 gadget put a $585 million Dutch ship at risk for 24 hours

A Dutch warship, HNLMS Evertsen, part of a NATO carrier strike group, unknowingly exposed its location for 24 hours after receiving a postcard with a hidden Bluetooth tracker. The tracker, similar to an Apple AirTag but cheaper at $5, was mailed in, allowing spies to track the $585 million Navy ship without physical access. Dutch authorities discovered and disabled the tracker within a day, prompting a ban on electronic greeting cards due to security risks. This incident highlights the ongoing challenges of maintaining operational security in the face of new technologies that can inadvertently compromise military operations.

Tom's Hardware
US-sanctioned currency exchange says $15 million heist done by "unfriendly states"

US-sanctioned currency exchange says $15 million heist done by "unfriendly states"

Grinex, a US-sanctioned cryptocurrency exchange in Kyrgyzstan, announced a $15 million heist allegedly orchestrated by hackers linked to "unfriendly states." TRM researchers confirmed the theft, noting more drained addresses than initially reported by Grinex. The attack targeted Russian users, with Grinex attributing it to a coordinated effort to harm Russia's financial sovereignty. TokenSpot, another Kyrgyzstan-based exchange, was also breached, with both exchanges becoming inoperable on Wednesday. The US Treasury Department had previously sanctioned Grinex's predecessor, Garantex, for facilitating ransomware actors and cybercriminals.

Ars Technica
MIT Technology Review

The Download: cyberscammers’ banking bypasses, and carbon removal troubles

Cyberscammers are using illicit tools sold on Telegram to bypass banks' security measures, exploiting weaknesses in facial recognition scans to gain unauthorized access. Meanwhile, concerns arise about the future of carbon removal efforts as Microsoft pauses its purchases, impacting around 80% of contracted carbon removal. These developments highlight ongoing challenges in cybersecurity and environmental sustainability within the tech industry.

MIT Technology Review
Iran reportedly bought an in-orbit Chinese satellite to target US military sites in the Middle East — purchase agreement included ongoing ground control services based in China

Iran reportedly bought an in-orbit Chinese satellite to target US military sites in the Middle East — purchase agreement included ongoing ground control services based in China

Iran's Islamic Revolutionary Guards Corps reportedly purchased a Chinese Earth-observation satellite in 2024, allowing them to capture high-resolution satellite imagery for military purposes. The satellite was acquired from a Chinese commercial aerospace company and included access to ground control services based in China. Despite the satellite's civilian nature, it was used to target US military sites in the Middle East, showcasing the dual-use application of such technology. The involvement of Chinese companies with ties to the military-industrial complex raises concerns about the blurred lines between civilian and military applications in the tech industry. The distributed nature of the satellite's services makes it challenging for potential attackers to disable it, highlighting the complexities of international tech collaborations in sensitive geopolitical contexts.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.