Riot Games Receives Ransom Email After Social Engineering Attack

Riot Games recently found itself as victim of a sophisticated attack by an advanced cybercriminal. Following a social engineering attack, the online video game company received an email threatening to release the stolen source code if a ransom wasn't paid. After a thorough investigation, Riot Games concluded that the attack compromised some of its data and source code for certain legacy products. The company was able to contain the threat quickly and provided statements to the press reassuring their users that no sensitive customer data was accessed. Although the stolen code was not publicly released, these kinds of threats are all too common in the world of online gaming. Games like Riot Games' League of Legends can be especially vulnerable to cyber-attacks. Hackers understand that video games with large user bases are often highly valuable targets for their malicious activities and unfortunately, players are the ones that get hurt the most. The attack on Riot Games highlights the need for game companies to be on the lookout for online security threats and to have cyber-attack prevention methods in place. Companies should consider investing in the latest information security technologies to ensure their data and source code are adequately protected. It is also important to be aware of the latest trends in cybercrime in order to better prepare your business against future threats. No matter the size of your business, taking the right steps to protect it against cyber-attacks is essential. Companies that prioritize cyber security, data protection, and online security measures will be in a better position to fend off potential threats and keep their users' data and source code safe.

This Cyber News was published on therecord.media. Publication date: Tue, 24 Jan 2023 18:56:02 +0000


Cyber News related to Riot Games Receives Ransom Email After Social Engineering Attack

Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
10 months ago Offsec.com
Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
9 months ago Securityzap.com
Riot Games Receives a 10 Million Dollar Ransom Demand - What Happened and How Can You Protect Your Organization? - Riot Games, the developer behind the popular video games League of Legends and Valorant, recently received a 10 million dollar ransom demand. This demand has the potential to cause chaos across the gaming world and can put any organization at risk if ...
1 year ago Heimdalsecurity.com
5 Valuable Skills Kids Can Gain by Playing Video Games - Video games come in all shapes and sizes and can be very educational for children of all ages. Video games can provide children with valuable skills that can help them in their everyday lives. From problem-solving abilities to self-control, learning ...
1 year ago Welivesecurity.com
Riot Games Refuses to Give in to Hackers' Ransom Demand - Gaming giant Riot Games recently experienced what it calls a “security incident” in which hackers demanded a ransom in exchange for the release of its data. Riot refused to pay and took measures to protect its employees and customers. The company ...
1 year ago Bleepingcomputer.com
Riot Games Receives Ransom Email After Social Engineering Attack - Riot Games recently found itself as victim of a sophisticated attack by an advanced cybercriminal. Following a social engineering attack, the online video game company received an email threatening to release the stolen source code if a ransom wasn't ...
1 year ago Therecord.media
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
7 months ago Securityweek.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
1 month ago Esecurityplanet.com
Riot Games Hacked: What You Need to Know - Riot Games, the company responsible for the popular video game League of Legends, has been hacked. This attack is the latest example of cyber-crime hitting the gaming industry, putting user data and information at risk. In this article, we’ll ...
1 year ago Securityaffairs.com
Riot Games Pauses Updates After Social Engineering Attack - Riot Games, the creators of the popular game League of Legends, recently announced that they will be pausing their updates after suffering from a social engineering attack. According to their statement, the company was targeted by an adversary who ...
1 year ago Therecord.media
Riot Games Hacked: Delays Game Patches After Security Breach - Riot Games, the developer behind League Of Legends, recently suffered from a security breach, leading to the delays in game patches. ...
1 year ago Bleepingcomputer.com
Here's How to Make Your Gaming Experience Safer - Over 1 billion people worldwide regularly play online games. The emergence of high-quality games, multiple gaming mediums, and online communities has prompted gamers to overlook the dark side of online gaming. If you play games online on your ...
10 months ago Cybersecurity-insiders.com
Combatting Social Engineering - One popular cyber-attack method known as social engineering leverages human psychology to gather information and perform attacks instead. Social engineering is the psychological manipulation of people into performing actions or divulging confidential ...
10 months ago Cyberdefensemagazine.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
11 months ago Cybersecuritynews.com
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
8 months ago Feedpress.me
AI and the Evolution of Social Media - A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in ...
7 months ago Securityboulevard.com
CVE-2020-1627 - A vulnerability in Juniper Networks Junos OS on vMX and MX150 devices may allow an attacker to cause a Denial of Service (DoS) by sending specific packets requiring special processing in microcode that the flow cache can't handle, causing the ...
3 years ago
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
9 months ago Securityzap.com
Insomniac hack files leak news on Wolverine, Spider-Man 3, and more - Oli Welsh is senior editor, U.K., providing news, analysis, and criticism of film, TV, and games. He has been covering the business & culture of video games for two decades. The ransomware group that hacked Spider-Man 2 developer Insomniac Games on ...
10 months ago Polygon.com
Fragging: The Subscription Model Comes for Gamers - The video game industry is undergoing the same concerning changes we've seen before with film and TV, and it underscores the need for meaningful digital ownership. Twenty years ago you owned DVDs. Ten years ago you probably had a Netflix subscription ...
9 months ago Eff.org
What is an email signature? - An email signature - or signature block or signature file - is the block of text that appears at the end of an email message that provides more information about the sender. This can include details such as the sender's full name, occupation or job ...
10 months ago Techtarget.com
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
1 year ago Trendmicro.com
Sony investigating potential ransomware attack on Insomniac Games unit - Sony said it is looking into reports of a ransomware attack on its subsidiary Insomniac Games, the studio behind popular titles like Spider-Man, Spyro the Dragon and more. On Tuesday, the Rhysida ransomware gang claimed to have attacked Insomniac ...
10 months ago Therecord.media
Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware - Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a ...
10 months ago Techrepublic.com
How software engineering will evolve in 2024 - From artificial intelligence and digital twin technologies, to platform engineering rooted in devops principles, to chaos engineering techniques that enhance resilience, to the expanded use of internal developer portals that boost productivity, ...
10 months ago Infoworld.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)