Riot Games Says Source Code Stolen in Ransomware Attack

Share This Post

Video games developer Riot Games on Tuesday confirmed that source code was stolen from its development systems during a ransomware attack last week.

The incident was initially disclosed on January 20, when the company announced that systems in its development environment had been compromised and that the attack impacted its ability to release content.

“Earlier this week, systems in our development environment were compromised via a social engineering attack. We don’t have all the answers right now, but we wanted to communicate early and let you know there is no indication that player data or personal information was obtained,” the company announced last week.

On January 24, Riot Games revealed that ransomware was used in the attack and that source code for several games was stolen.

“Over the weekend, our analysis confirmed source code for League, TFT, and a legacy anticheat platform were exfiltrated by the attackers,” the games developer said.

The company reiterated that, while the development environment was disrupted, no player data or personal information was compromised in the attack.

The stolen source code, which also includes some experimental features, will likely lead to new cheats emerging, the company said.

“Our security teams and globally recognized external consultants continue to evaluate the attack and audit our systems. We’ve also notified law enforcement and are in active cooperation with them as they investigate the attack and the group behind it,” Riot Games added.

The game developer also revealed that it received a ransom demand, but noted that it has no intention to pay the attackers. The company has promised to publish a detailed report of the incident.

According to Motherboard, the attackers wrote in the ransom note that they were able to steal the anti-cheat source code and game code for League of Legends and for the usermode anti-cheat Packman. The attackers are demanding $10 million in return for not sharing the code publicly.

Related:Ransomware Revenue Plunged in 2022 as More Victims Refuse to Pay Up: Report

Related:Ransomware Attack on DNV Ship Management Software Impacts 1,000 Vessels

Related: The Guardian Confirms Personal Information Compromised in Ransomware Attack

SecurityWeek

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.