![]() Uber has confirmed in their statement the hacker gained access through a combination of malware and social engineering. This attack method would match up with what we saw in the Uber breach. This in turn would allow access to the source code for the two games. It is likely the hacker would have found a method such as credentials in a script on the network which allowed them to gain more access to the network. This is a standard practice among attackers to quickly scan for information and credentials. ![]() Once the hacker was on Rockstar’s network, they would have initiated a scan of the network looking for additional credentials that could be used to gain more access. Typically during these kinds of attacks, additional methods can be used to get around bypass such as a further social engineering attack to convince an individual to allow the MFA request. The hacker used a social engineering attack to gain initial access to systems. While many details still remain to be revealed and we do not yet have a complete picture of how this hack happened, there is enough information to draw some conclusions. However, given that the hacker also claimed to have source code for two games and additional content it is likely the hacker had additional access not yet revealed. ![]() What we know for sure is that the hacker indicated they had access to Rockstar's Slack environment, and potentially Confluence as well. Rockstar and Take Two have not released any details about the hack at this point. However, there are now reports that GTA5’s source code is indeed being leaked on the Internet. Additionally, Uber called out Rockstar as being a related hack and that they are working with the FBI and DoJ on the investigation.Īt this time, neither Rockstar nor their parent company Take Two has released any specific details of the hack, nor what data has been compromised. The Uber update provided Monday talks about the hacker possibly being affiliated with a hacking group called Lapsus$. In the tweet, Rockstar indicated “an unauthorized third party illegally accessed and downloaded confidential information from our systems, including early development footage for the next Grand Theft Auto.” By this time, legal teams were involved in getting content removed from the Internet, and the original post on GTAForum was also locked.įinally, Uber provided an update to their breach event which took place last week. On Monday, Rockstar posted a confirmation that their systems had indeed been breached on twitter. Just a few hours after the initial post, Bloomberg reporter Jason Schreier tweeted confirmation the leak was real, although there was no official word given from Rockstar at this point. Teapotuberhacker indicated that he retrieved this data from Rockstar’s Slack and Confluence systems. The hacker also claimed to be the same hacker who recently breached Uber just a few days earlier. In the post, the hacker also claimed that they might leak more data including GTA5 and 6 source code and assets as well as a GTA6 test build. This post contained 90 screenshots and videos of the game, which is still in early development. On September 18th at 3:26am Pacific, a user by the name “teapotuberhacker” created a forum post on GTAForums. Everything We Know About the GTA6 Leak So Far ![]() It’s all too easy for attackers to find and use poorly stored credentials, resulting in severe data leaks. The Rockstar breach last month resulting in the leak of Grand Theft Auto 6 is another example of how privilege escalation can happen even among a team of smart, well-intentioned developers making world-class software. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |