Info@NationalCyberSecurity
Info@NationalCyberSecurity

Ready or Not dev Void Interactive confirms it was hacked, says no user or staff data was breached | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


Sign up for the GI Daily here to get the biggest news straight to your inbox

Void Interactive, the developer behind SWAT team shooter Ready or Not, has confirmed reports that it has been hacked.

Earlier this week, Insider Gaming reported the studio had suffered a breach that stole over 4TB of data, including the complete source code for Ready or Not.

In a statement to Kotaku, the company confirmed a data breach had taken place but said the damage was more limited than has been reported, assuring that all player data is safe.

The developer said that the hackers were able to take screenshots of “top-level project and company-related information” but added that this “does not involve any sensitive data leakage.”

“We can confirm that no user-related data or staff information has been breached during this incident,” a Void Interactive spokesperson said. “Our top priority remains the security and privacy of our users and contributors (we do not capture any personal user information in the first place).

“Furthermore, we have confirmed that some source code as well as directory information has been stolen as a result of this breach. Our development assets and proprietary code remain secure and intact.”

Void Interactive attributed the hack to “critical vulnerabilities” in TeamCity’s cloud services, which it used to manage the various builds of the game. The studio said its investigation is ongoing, but so far it appears the attack was “limited to the TeamCity services interface.”

function appendFacebookPixels() {
if (window.facebookPixelsDone) return;
!function(f,b,e,v,n,t,s)
{if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};
if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version=’2.0′;
n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];
s.parentNode.insertBefore(t,s)}(window, document,’script’,
‘https://connect.facebook.net/en_US/fbevents.js’);

fbq(‘init’, ‘1863210500478936’);

fbq(‘track’, ‘PageView’);
window.facebookPixelsDone = true;

window.dispatchEvent(new Event(‘BrockmanFacebookPixelsEnabled’));
}

window.addEventListener(‘BrockmanTargetingCookiesAllowed’, appendFacebookPixels);

——————————————————–


Click Here For The Original Story From This Source.

.........................

National Cyber Security

FREE
VIEW