• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Grand Theft Auto Publisher Rockstar Games Hacked

flyytech by flyytech
September 20, 2022
Home Security
Share on FacebookShare on Twitter


Threat actor Lapsus$ is now seemingly responsible for hacking gaming giant Rockstar Games after targeting mega-brands like Microsoft, Cisco, Samsung, Nvidia, Okta and probably Uber.

An account operating name ‘teapotuberhacker’ posted on GTAForums around 90 videos of what appeared to be in-development footage of the upcoming Rockstar Games installment, Grand Theft Auto 6 – that the publisher confirmed it was working on earlier this year.

The videos, which totaled around 50 minutes of footage, included short clips of animation tests to more detailed animation scenes. They were then widely shared on social media.

After posting the alleged in-development footage on September 18, 2022, teapotuberhacker left a message claiming they wanted to “negotiate a deal” with the game publisher to return unreleased data, including the source code for Grand Theft Auto 5 and the in-development version of Grand Theft Auto 6.

“This is not the first case where a cyber-criminal group has stolen an organization’s source code, with both LastPass and Midea Group suffering a similar fate in the last month. Source code is part of a company’s intellectual property and therefore holds massive value to cyber criminals. It can be used to find hidden security vulnerabilities and launch further attacks on a business,” Sam Linford, VP of EMEA Channels at Deep Instinct, told Infosecurity Magazine.

However, in a message to Infosecurity on September 19, Craig McDonald, VP of Product Management at BackBox, insisted that at present, “it is still unclear if the attacker gained access to data beyond the video clips that were posted.”

Rockstar Games and its parent company, Take-Two Interactive, acknowledged the leak on September 19, 2022.

In a statement posted to Twitter, Rockstar said: “We recently suffered a network intrusion in which an unauthorized third party illegally accessed and downloaded confidential information from our systems, including early development footage for the next Grand Theft Auto. At this time, we do not anticipate any disruption to our live game services nor any long-term effect on the development of our ongoing projects. [..] Our work on the next Grand Theft Auto game will continue as planned, and we […] will update everyone again soon and, of course, will properly introduce you to this next game when it is ready.”

Take-Two has issued takedown notices to GTAForums and social media accounts, including YouTube and the GTA subreddit. The original GTAForums thread started by teapotuberhacker was removed, then relaunched with all links and GTA 6 details removed, reported The Guardian.

Lapsus$ gang buoyant in recent months

It appears that teapotuberhacker gained administrative access to the Rockstar Games internal network after an employee clicked on a malicious email. The threat actor was then able to download the videos from the staff members’ Slack channels – a similar method was used in a recent Uber data breach, which teapotuberhacker also claimed responsibility for.

In a September 19 update, Uber said the culprit could be linked with the Lapsus$ hacking gang that has been particularly active recently, reportedly targeting tech companies such as Microsoft, Cisco, Samsung, Nvidia and Okta.

“This cyberattack should serve as the catalyst to change mindsets and attitudes towards cybersecurity,” said Linford, “Breaches like this show us that it is more important than ever to implement preventative measures: evaluate cyber secure strategy and policies, accurately estimate, and quantify the impacts of a cyberattack and the impact on the organization in the case of data leak and prioritize the protection of data. Organizations need to take preventive measures that stop cyberattacks before they breach the network. Businesses need a line of defense which can stop these attacks before they have time to execute, let alone steal data.”

“To be secure, all the infrastructure devices in an organization’s network must have the latest operating systems and patches and be configured in compliance with internal security policies as well as government and industry regulations. Preventative measures like that often take a back seat to more pressing network management tasks, so companies should invest in network security automation to ensure a continuous motion for upgrades and patches. Implementing a baseline for proper automation will ensure that these tasks are running consistently and reliably and can deter future data-compromising attacks from accessing critical and confidential information,” added McDonald.



Source_link

flyytech

flyytech

Next Post
Motive Studio Announces Single-Player Iron Man Game As First Part Of New EA/Marvel Collaboration

Motive Studio Announces Single-Player Iron Man Game As First Part Of New EA/Marvel Collaboration

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

A first look at using iMessage from a PC with Microsoft’s Phone Link app

A first look at using iMessage from a PC with Microsoft’s Phone Link app

March 25, 2023
Over 39,000 Unauthenticated Redis Instances Found Exposed on the Internet

Over 39,000 Unauthenticated Redis Instances Found Exposed on the Internet

September 21, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Allen Parr’s false teaching examined. Why you should unfollow him.

Allen Parr’s false teaching examined. Why you should unfollow him.

September 24, 2022
Review: Zoom ZPC-1

Review: Zoom ZPC-1

January 28, 2023
Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

Elden Ring best spells 1.08: Tier lists, sorceries, incantations, and locations

January 14, 2023
CPU Benchmarks Hierarchy 2022: Processor Ranking Charts

CPU Benchmarks Hierarchy 2022: Processor Ranking Charts

September 11, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Dynamics SL to Dynamics 365 Business Central Migration 2023

Dynamics SL to Dynamics 365 Business Central Migration 2023

March 31, 2023
BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist

BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist

March 31, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT