Latest Cyber Attacks On Game-Makers

The Japanese video game-maker Capcom has said its computer systems were hacked in just the latest cyber-attack to hit the games industry.  Capcom is the maker of such well-known video games as Resident Evil, Mega Man, and Street Fighter.  Hackers gained unauthorised access to file and email servers and Capcom says some of its internal networks had to be suspended "due to unauthorised access".  

The attack does not appear to have affected players’ online access to the firm’s video games and websites the company say there no sign that customer information had been accessed "at present".

Capcom released a statement saying:‘Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers... The company has confirmed that this was due to unauthorised access carried out by a third party, and that it has halted some operations of its internal networks on November 2. 

Capcom is consulting with the police as well as other related authorities while both carrying out an investigation and taking measures to restore its systems. The company will continue to offer relevant updates as the facts become clear, via its websites.

This is the latest in a series of recent high-profile leaks and hacks of companies in the gaming industry.

Recently a reports said that Ubisoft's game about hacking, 'Watch Dogs: Legion', may have been hacked, with its source code stolen and reportedly leaked online. The same hacker group also claims to have accessed the developer Crytek's internal information. These security breach that saw stolen files posted on the Dark Web. These hacks appear to have been the work of a ransomware gang calling itself Egregor, whose malware is said to be closely related to another family of ransomware known as Sekhmet.

Capcom noticed the attack after its internal networks began to have issues that affected company email and the servers where it stores its files and has xpressed "its deepest regret for any inconvenience this may cause to its various stakeholders."

Capcom:      ITPro:    BBC:      Tripwire:   ZDNet:    PCGamer:      Techraptor:

You Might Also Read:

Virtual Reality – Just Getting Started:

 

« The Skills Shortage Presents A Looming Cyber Security Threat
CyberHelm To Counter Attacks On Shipping & Ports »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Reason Cybersecurity

Reason Cybersecurity

Reason Cybersecurity is a powerful cloud-based security software that detects, blocks and destroys malware, adware and PUPs in real-time.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

Kocho

Kocho

Kocho (previously TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Talon Cyber Security

Talon Cyber Security

Talon Cyber Security provide a next-generation technology designed to protect against a new category of threats posed by distributed work and accelerated cloud usage.

Swiss Cyber Forum (SCF)

Swiss Cyber Forum (SCF)

The Swiss Cyber Forum (SCF) builds competences and helps its members to mitigate the cyber risks associated with digitalisation.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Redbot Security

Redbot Security

Redbot Security provides industry leading manual penetration testing. Protecting critical systems and data - red team attack and breach simulations, (OT) critical infrastructure testing.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.