What We Know Concerning the Grand Theft Auto VI Information Breach

On September 18, a cyber menace actor referred to as “teapotuberhacker” posted on claiming to have hacked Rockstar Video games, the makers of the favored and controversial film. Grand Theft Auto (GTA) sequence. Within the submit, which has since been deleted, teapotuberhacker claimed to have stolen the supply code for the extremely anticipated Rockstar. Grand Theft Auto VI alongside together with his predecessor GTA Vplus 90 alpha video clips.

Though identified for its scale, this cyberattack additionally uncovered Rockstar Video games’ secrecy about GTA VI. Previously 9 years, the online game firm had not stated something concerning the improvement of the sport, thus formally confirming its existence in early February. Nevertheless, Rockstar Video games confirmed the actual fact of the info leak in a public assertion:

“We just lately skilled a cyber assault through which an unauthorized third occasion illegally obtained and downloaded confidential data from our methods, together with pre-production footage for the subsequent Grand Theft Auto.”

Rockstar Video games

This knowledge breach provides to the rising listing of cyber assaults hitting organizations within the gaming trade. Over the previous decade, the online game trade has confronted quite a few cyber threats that vary from technical vulnerabilities to bodily safety challenges. Executable vulnerabilities, fraud, stolen accounts, denial of service (DDoS) assaults and software program piracy are the most typical. Nevertheless, in recent times gaming corporations have grow to be in style targets for cybercriminal gangs and superior menace teams (APTs).

What we all know concerning the Rockstar knowledge breach

teapotuberhacker’s The unique discussion board thread attracted a lot consideration, it will definitely made the location briefly inaccessible. A while later, the platform was faraway from any posts containing stolen content material. Dissatisfied, teapotuberhacker launched a brand new Telegram deal with as a way of communication. The menace actor then stated they’d launch a doc or PDF containing the brand new data together with the affected supply code on September twenty first or twenty second. Flashpoint is presently monitoring any additional exercise.

They haven’t set this schedule. The day the unique submit was launched, Flashpoint analysts seen it teapotuberhackerreal-world identities had been given away in unlawful on-line boards. Within the thread, titled “The Man Who Hacked GTA 6 and Uber Is Arion,” the discussion board moderator claimed that teapotuberhacker was the identical one who allegedly hacked Microsoft and “owned” Doxbin.

As well as, the administrator linked teapotuberhacker with different aliases equivalent to “White” and “Breachbase, and stated that he was a member of LAPSUS$. Though the strategies, techniques, and procedures utilized by teapotuberhacker are per LAPSUS$, these communities will typically make claims of pretend vs. different. Flashpoint analysts have recognized unique docs the place content material can fluctuate from individual to individual; these are often composed by people inside these communities and ought to be handled with a wholesome stage of skepticism.

Flashpoint has collected many different doable teapotuberhacker aliases and located that the methods, strategies and procedures used within the Rockstar breach are per different associated hacks.

Monitor extra unlawful actions

Flashpoint analysts have been actively pursuing different unlawful leads relating to this incident.

Whereas many different customers have been posting pirated content material stemming from the earlier model of teapotuberhacker, we’ve discovered extra data which will clarify how the breach occurred, in addition to its scope.

A day earlier than the Rockstar Video games breach was revealed, one other actor posted a menace in a unique chat channel that they knew was teapotuberhacker.. Then shortly after the drop, this actor revealed extra context concerning the Rockstar Video games breach. To show their claims, they offered a number of screenshots exhibiting the teapotuberhacker’s entry to Rockstar knowledge, in addition to photos exhibiting their very own relationship with the teapotuberhacker.

The menace actor who claimed to keep up a correspondence with teapotuberhacker additionally claimed the next about GTA VI knowledge breach. Flashpoint Analysts believes that this data ought to solely be used as a information to investigation and never be interpreted as definitive or conclusive proof.

  • Teapotuberhacker compromised Rockstar Video games from an inside Rockstar Slack channel.
  • This was completed by social engineering a Rockstar worker primarily based in India, to realize entry to Rockstar’s Okta.
  • Utilizing their entry, teapotuberhacker stole the supply code for GTA V, GTA VI, Pink Useless Redemption 2, and Pink Useless Redemption 3.

Defend your group with Flashpoint

Understanding the techniques utilized by menace actors and prison teams helps safety groups higher shield their networks. Attackers typically use tried and true techniques, stringing collectively a number of techniques that may simply be replicated in opposition to a number of organizations. To guard themselves in opposition to cybercriminals, organizations will tremendously profit from deep and complete Intelligence. Join a free trial in the present day.

About the author


Leave a Comment