Game Studio Ubisoft Investigates Claims of Data Security Incident

Video gaming company Ubisoft revealed that it is looking into reports that hackers attempted to steal data this week by breaching into its networks.
The claims were made in a series of social media posts by vx-underground, which hosts the internet's largest collection of malware source code, samples, and publications.
The account has become well-known for its interactions with hackers and ransomware gangs, and it frequently shares threat actors' information.
Alleged screenshots of Microsoft Teams accounts and other points of access were published by the hackers via the vx-underground account.
The Egregor ransomware group first attacked the video game publisher in 2020.
The publisher is primarily renowned for titles including Assassin's Creed, Far Cry, and Prince of Persia.
The organisation disclosed a well-known game's source code.
In 2021, the company acknowledged that player data from its Just Dance video game franchise was compromised due to a vulnerability in its IT structure.
If confirmed, the incident would be the latest in a string of high-profile hacks on one of the biggest game studios.
Arion Kurtaj was sentenced to an indefinite hospital order by a UK court on Thursday for his role in many attacks on large businesses, the most notorious of which involved Rockstar Games, the developer of Grand Theft Auto.


This Cyber News was published on www.cysecurity.news. Publication date: Tue, 26 Dec 2023 15:13:05 +0000


Cyber News related to Game Studio Ubisoft Investigates Claims of Data Security Incident

What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
5 months ago Techtarget.com
Incident Response Plan: How to Build, Examples, Template - A strong incident response plan - guidance that dictates what to do in the event of a security incident - is vital to ensure organizations can recover from an attack or other cybersecurity event and minimize potential disruption to company ...
5 months ago Techtarget.com
Ubisoft says it's investigating reports of a new security breach - Ubisoft is investigating whether it suffered a breach after images of the company's internal software and developer tools were leaked online. Ubisoft is a French video game publisher known for well-known titles, including Assassin's Creed, FarCry, ...
6 months ago Bleepingcomputer.com
Ubisoft says it's investigating reports of a new security breach - Ubisoft is investigating whether it suffered a breach after images of the company's internal software and developer tools were leaked online. Ubisoft is a French video game publisher known for well-known titles, including Assassin's Creed, FarCry, ...
6 months ago Bleepingcomputer.com
New Microsoft Incident Response team guide shares best practices for security teams and leaders - The incident response process can be a maze that security professionals must quickly learn to navigate-which is no easy task. Surprisingly, many organizations still lack a coordinated incident response plan, and even fewer consistently apply it. ...
6 months ago Microsoft.com
How to Conduct Incident Response Tabletop Exercises - An incident response tabletop exercise is an activity that involves testing the processes outlined in an incident response plan. Attack simulations are run to ensure incident response team members know their roles and responsibilities - and whether ...
5 months ago Techtarget.com
Regenerate and Conquer: Wolverine's Real-Time Damage System to Dominate the Gaming Landscape - Marvel's Wolverine has leaked details which suggest that the game will use advanced features, even those that are not available on current PlayStation 5 hardware, to play the game. In the recent Insomniac data breach, a new rumour has been ...
6 months ago Cysecurity.news
4 key steps to building an incident response plan - In this Help Net Security interview, Mike Toole, head of security and IT at Blumira, discusses the components of an effective security incident response strategy and how they work together to ensure organizations can address cybersecurity issues. An ...
4 days ago Helpnetsecurity.com
Fragging: The Subscription Model Comes for Gamers - The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership. Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription ...
5 months ago Eff.org
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting - I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do's and don'ts in incident response as Dragoș explains how to avoid the most common mistakes ...
6 months ago Heimdalsecurity.com
Game Studio Ubisoft Investigates Claims of Data Security Incident - Video gaming company Ubisoft revealed that it is looking into reports that hackers attempted to steal data this week by breaching into its networks. The claims were made in a series of social media posts by vx-underground, which hosts the internet's ...
6 months ago Cysecurity.news
Game studio Ubisoft examines claims of data security incident - Video game giant Ubisoft said it is investigating claims that hackers infiltrated its systems this week and attempted to steal data. The claims came in a series of social media posts from vx-underground, which runs the largest collection of malware ...
6 months ago Therecord.media
How to build a cyber incident response team - As an incident response manager himself, Valentin regularly coordinates security responses for companies of all shapes and sizes - including many of the examples discussed in this post. He explains everything you need to know about building and ...
7 months ago Heimdalsecurity.com
How to create an incident response playbook - Creating and maintaining an incident response playbook can significantly improve the speed and effectiveness of your organization's incident response. To help, here's a crash course on what incident response playbooks are, why they are important, how ...
6 months ago Techtarget.com
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
1 year ago Hackread.com
Important details about CIRCIA ransomware reporting - This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. Ransomware attacks have become ...
1 month ago Securityintelligence.com
Ubisoft ransomware attack gets thwarted - Ubisoft, the France-based video game publisher, recently announced that its in-house threat monitoring software successfully thwarted a ransomware attack that occurred on December 20th of this year. Despite this security success, the company is ...
6 months ago Cybersecurity-insiders.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
How Hackers are Auctioning Off the Alleged Source Code for League of Legends - An alarming security risk has surfaced as hackers are auctioning off an alleged source code for the popular video game League of Legends (LoL). It is reported that the hackers have accessed this code through illegally obtaining administrator access ...
1 year ago Bleepingcomputer.com
Sony investigating potential ransomware attack on Insomniac Games unit - Sony said it is looking into reports of a ransomware attack on its subsidiary Insomniac Games, the studio behind popular titles like Spider-Man, Spyro the Dragon and more. On Tuesday, the Rhysida ransomware gang claimed to have attacked Insomniac ...
6 months ago Therecord.media
Insurers Use Claims Data to Recommend Cybersecurity Technologies - Businesses using a managed detection and response provider cut their median response time to a cyber incident by half, and saw a commensurate - and dramatic - reduction in the impact of each incident, according to an analysis of insurance claims ...
4 months ago Darkreading.com
Ransomware attack on indie game maker wiped all player accounts - A ransomware attack on the "Ethyrial: Echoes of Yore" MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. Ethyrial: Echoes of Yore is a free-to-play old-school MMORPG developed by indie game ...
7 months ago Bleepingcomputer.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
Continuity in Chaos: Applying Time-Tested Incident Response to Modern Cybersecurity - Incident response is foundational to every security program, yet many companies still struggle with adoption and testing. He enumerated the top challenges of incident response at the time which were 1) Increasing complexity and sophistication of ...
5 months ago Securityweek.com
Apex Legends pro tourney canned following cheaty cyberattack The Register - Esports pros competing in the Apex Legends Global Series Pro League tournament were forced to abandon their match today due to a suspected cyberattack. In the early hours of Monday morning, two professional Apex Legends players competing in two ...
3 months ago Go.theregister.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)