Info@NationalCyberSecurity
Info@NationalCyberSecurity

Apex Legends tournament hacker says he did it “for fun” | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


The hacker who disrupted the North American Apex Legends Global Series finals has said he did it “just for fun”.

The Apex Legends esport finals took place earlier this week, during which two players were hacked, and given cheat-based abililties. EA and Respawn abandoned the finals, with the Apex esports team stating the “competitive integrity” of the series had been “compromised”.

It’s believed that Destroyer2009, a hacker previously seen in Apex Legends, was behind the security breach. In a new interview with TechCrunch, Destroyer2009 said the hacks were his work, which he did “just for fun”.


Meet Newcastle | Apex Legends Character Trailer


Meet Newcastle | Apex Legends Character Trailer

Destroyer2009 said the hack was intended to show the vulnerabilities present in Apex Legends with good intentions – in order to highlight the issue to a large audience. “Not many people would have used an exploit like that in an absolutely innocent way for players,” he said. He claimed he didn’t report the vulnerability to Respawn and EA because they don’t offer rewards to third parties who find security flaws.

Destroyer2009 declined to give details on how he executed the hacks, but claimed it had “nothing to do with the server”, and he “never touched anything outside of the Apex process”. He also claimed he didn’t hack either of the players’ computers. “I really don’t want to go into the details until everything is fully patched and everything goes back to normal,” he said.

Easy Anti-Cheat came under scrutiny following the Apex finals hack. After suggestions the hack was carried out through a vulnerability in Easy Anti-Cheat, the company made its first post on X in five years to state it was “confident that there is no [remote code execution] vulnerability within EAC”.

Yesterday, Respawn confirmed the hacks occurred during the tournament and that the studio had deployed the “first of a layered series of updates” to increase player security.

function appendFacebookPixels() {
if (window.facebookPixelsDone) return;
!function(f,b,e,v,n,t,s)
{if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};
if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;
n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];
s.parentNode.insertBefore(t,s)}(window, document,’script’,
‘https://connect.facebook.net/en_US/fbevents.js’);

fbq(‘init’, ‘560747571485047’);
fbq(‘init’, ‘738979179819818’);

fbq(‘track’, ‘PageView’);
window.facebookPixelsDone = true;

window.dispatchEvent(new Event(‘BrockmanFacebookPixelsEnabled’));
}

window.addEventListener(‘BrockmanTargetingCookiesAllowed’, appendFacebookPixels);

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW