Technology

What we all know in regards to the Grand Theft Auto VI knowledge breach

On September 18, a cyber menace actor named “teapotuberhacker” posted on GTAForums.com claiming to have hacked Rockstar Video games, the creator of the favored and controversial movie Grand Theft Auto (GTA) sequence. Within the since-deleted submit, teapotuberhacker claimed to have stolen the supply code for the extremely anticipated Rockstar Grand Theft Auto VI in addition to earlier than him GTA Valong with 90 movies of alpha footage.

https://net.archive.org/net/20220918045635/https://gtaforums.com/matter/985481-gta-6-US-leak-90-mp4-footagevideos/

Whereas notable for its dimension, this cyberattack additionally lifted Rockstar Video games’ veil of secrecy about GTA VI. . . . For the previous 9 years the online game firm has been extraordinarily tight-lipped in regards to the improvement of the sport, solely formally confirming its existence in early February. Nevertheless, Rockstar Video games confirmed the authenticity of the leak in a public assertion:

“We just lately skilled a community intrusion the place an unauthorized third social gathering illegally accessed and downloaded confidential data from our programs, together with early improvement footage for the upcoming Grand Thief.”

Rockstar Video games

This knowledge breach provides to the rising checklist of cyber assaults that organizations within the gaming trade are experiencing. Over the previous decade, the online game trade has confronted quite a few cyber threats starting from technical dangers to bodily safety challenges. Exploited vulnerabilities, scams, stolen accounts, distributed denial of service (DDoS) assaults and software program piracy are the commonest. Lately, nevertheless, gaming corporations have grow to be common targets for cybercrime gangs and superior persistent menace (APT) teams.

What we all know in regards to the Rockstar knowledge breach

Teapotuberhacker’s The unique discussion board thread attracted loads of consideration, finally making the location inaccessible for some time. After some time, the discussion board was purged of any posts containing stolen content material. Out of resentment, teapotuberhacker offered a brand new Telegram deal with as a way of publicity. The menace actor then introduced that on September 21 or 22 they’d launch a doc or PDF with new data in addition to compromised supply code. Flashpoint is at the moment monitoring for any additional exercise.

They haven’t achieved this timeline. On the day the unique submit was made, Flashpoint analysts found that. teapotuberhackerThe actual-world ID had been posted on an unlawful on-line discussion board. In that thread titled “The one who hacked GTA 6 and Uber is Arion,” the moderator of that discussion board claimed that teapotuberhacker is identical one who allegedly hacked Microsoft and “owned” Doxbin.

Moreover, the moderator linked teapotuberhacker to different aliases akin to “White” and “Breachbase, and acknowledged that he was a member of LAPSUS$.Whereas the techniques, strategies, and procedures utilized by teapotuberhacker had been according to LAPSUS$, these communities usually made false claims from flip towards one another.Flashpoint analysts recognized earlier docs the place the content material could range on the identical particular person;these are usually run by people inside these communities and needs to be handled with a wholesome diploma of skepticism.

Flashpoint has collected a number of different aliases that would probably belong to teapotuberhacker and located that the techniques, strategies and procedures used within the Rockstar breach had been according to different hacks.

Pursuing extra criminal activity

Flashpoint analysts have been actively monitoring different unlawful channels relating to this occasion.

Whereas many different customers have posted stolen content material taken from the preliminary teapotuberhacker takedown, now we have discovered further data that most certainly particulars how the breach occurred, in addition to its scope.

The day earlier than the Rockstar Video games breach was revealed, one other menace actor posted on a distinct unlawful chat channel that they knew teapotuberhacker. . . . Then quickly after the drop, this actor revealed further context in regards to the Rockstar Video games infringement. To show their claims, they offered quite a few screenshots exhibiting teapotuberhacker’s entry to Rockstar’s knowledge, in addition to pictures exhibiting their relationship with teapotuberhacker.

The menace actor who claims to be in a relationship with teapotuberhacker has additionally made the next claims about. GTA VI Information breaches. Flashpoint analysts be aware that this data ought to solely be used as investigative leads and never be interpreted as definitive or conclusive proof.

  • Teapotuberhacker compromised Rockstar Video games from an area Rockstar Slack channel.
  • This was achieved by social engineering a Rockstar worker situated in India, getting access to Okta Rockstar.
  • Utilizing their entry, teapotuberhacker stole supply code for. GTA V, GTA VI, Pink Lifeless Redemption 2, and 3. Pink Lifeless Rescue. . . .

Defend your group with Flashpoint

Understanding the techniques utilized by menace actors and legal teams helps safety groups higher shield their networks. Attackers usually use tried-and-true strategies, combining a number of strategies that may be simply replicated towards most organizations. To defend towards cybercriminals, organizations make nice use of complete and correct accomplished intelligence. Join a free trial right now.

About the author

admin

Leave a Comment