GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

CD Projekt Red source code reportedly sells for millions in dark Web auction [Updated]

globalresearchsyndicate by globalresearchsyndicate
February 13, 2021
in Data Collection
0
CD Projekt Red source code reportedly sells for millions in dark Web auction [Updated]
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

This bird has been hacked!
Enlarge / This bird has been hacked!

Earlier this week, CD Projekt Red announced that it had been hit with a ransomware attack that allegedly exposed the source code for games including Cyberpunk 2077, Gwent, and The Witcher 3. Now, security experts are reporting that the source code has been auctioned off on a dark Web forum, seemingly for millions of dollars.

VX Underground, which tracks ransomware and other malware attacks, noted on Wednesday that the ransomed source code had been posted on a dark Web forum known as EXPLOIT. The starting bid was reportedly $1 million, with a $500,000 bidding increment and $7 million “buy it now” price.

Cyber intelligence firm KELA confirmed the authenticity of that auction, telling The Verge that forum users needed to put up 0.1 BTC (roughly $4,700 as of this writing) to participate in the bidding as a sign that offers were legitimate. The sellers also reportedly provided file listings for Gwent and the Red Engine that underlies CDPR’s games as proof that the data was authentic.

While the auction was originally intended to run for 48 hours, by Thursday morning KELA and VX Underground were both reporting that it had been closed successfully. “An offer was received outside the forum that satisfied us,” the sellers wrote, according to the reports.

[Update: At least one analyst sees reason to doubt the seller’s report of a separate buyer swooping in from outside the auction. “There is another possible scenario that we think is more likely: no buyer exists and the closure of the auction is simply a means for the criminals to save face after failing to monetize the attack following CD Projekt’s refusal to pay the ransom,” Emsisoft Threat Analyst Brett Callow wrote in a blog post. “We have seen this behavior in the past with REvil, a ransomware group that threatened to release damaging information about Donald Trump. Although the hacked law firm refused to pay to prevent the leak, the information was never published—the attackers just claimed to have sold it.”]

Advertisement

KELA threat intelligence analyst Victoria Kivilevich told IGN that the stolen data was sold in a single package. The sellers also reportedly threatened on separate dark Web forums that CDPR will now have “a lot of interest [sic] things on their accounts alive [sic]” if they didn’t close the auction by paying the ransom.

CDPR said on Monday that documents “relating to accounting, administration, legal, HR, investors relations, and more” were taken as part of the attack, adding that “we will not give in to the demands nor negotiate with the actor, being aware that this may eventually lead to the release of the compromised data.”

Security experts analyzing the ransom note shared by CDPR have identified a hacking group known as HelloKitty as the likely culprit in the ransomware attack. That same group was reportedly behind a ransomware attack on Brazilian power company CEMIG, among others, late last year.

The raw source code for a game, which is used to create the executable files distributed to players, is usually considered to be among a developer’s most valuable trade secrets. Back in 2003, the leak of source code for Valve’s then-unreleased Half-Life 2 led to the arrest of a German hacker. More recently, a large tranche of source code for classic Nintendo games was released online as part of a so-called “Gigaleak.”

Peter Groucutt, the managing director of IT protection service Databarracks, said this kind of “Double Extortion” ransomware attack (where data is stolen and also locked behind an encryption key) could be a growing threat to businesses with popular intellectual property. “Ransomware originally sought to simply paralyze a business [and] victims with robust backups could refuse to pay the ransom and restore their data from backups,” he said. “The difference between this attack and other Double Extortion attacks is the exfiltrated data was highly valuable IP. Even if you don’t pay up, criminals can still make a considerable amount of money by selling the IP. If these attacks prove successful, we may see a shift to targeting those organizations with the most valuable data.”

A recent report by cybersecurity analysis firm Coveware found that total ransomware attack payments dipped slightly in the fourth quarter of 2020, after rising steadily for years prior, as more companies refuse to pay. An increasing number of those attacks now include threats to leak data online, Coveware found, and hackers often release stolen data even if the desired ransom is paid.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Survey: Vail, other resorts benefit from clear COVID protocols

Survey: Vail, other resorts benefit from clear COVID protocols

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com