Capcom hit by ransomware attack

img_logo.jpg
Earlier this week, we reported on hacking events on video game companies Crytek and Ubisoft, with the source code of Watch Dogs: Legion even getting leaked. Now another company, Capcom, has been victim of a similar attack from a different group. The company issued a statement that on November 2nd, third parties gained access to "certain systems, including email and file servers" and added that "there is no indication that any customer information was breached".

Below you can read Capcom's official statement:

Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers. The company has confirmed that this was due to unauthorized access carried out by a third party, and that it has halted some operations of its internal networks as of November 2. Capcom expressed its deepest regret for any inconvenience this may cause to its various stakeholders. Further, it stated that at present there is no indication that any customer information was breached. This incident has not affected connections for playing the company's games online or access to its various websites.

Presently, Capcom is consulting with the police as well as other related authorities while both carrying out an investigation and taking measures to restore its systems. The company will continue to offer relevant updates as the facts become clear, via its websites and other means.

A report from Bleeping Computer identifies as the cyberattack as being a Ragnar Locker ransomware, with 1TB of sensitive data stolen from Capcom's corporate networks. According to the report, the cyberattack group left the following ransom note and are demanding $11,000,000 in bitcoins.

We have BREACHED your security perimeter and get access to every server of company's Network in different offices located in Japan, USA, Canada.
So we has DOWNLOADED more than 1TB total volume of your PRIVATE SENSITIVE Data, including:
-Accounting files, Banking Statements, Budget and Revenue files classified as Confidential, Tax Documents
-Intellectual Property, Proprietary Business information, Clients and Employees Personal information (Such as Passports and Visa), Incidents Acts
-Corporate Agreements and Contracts, Non-Disclosure Agreements, Confidential Agreements, Sales Summaries
-Also we have your Private Corporate Correspondence, Emails and Messanger Conversations, Marketing presentations, Audit reports and a lot of other Sensitive Information

If NO Deal made than all your Data will be Published and/or Sold through an auction to any third-parties


:arrow: SOURCE
 

AkiraKurusu

New 3DS XL > Switch
Member
Joined
Dec 29, 2019
Messages
808
Trophies
1
Age
23
Location
Northwood, Sydney
XP
1,439
Country
Australia
Why do tech-savvy Hakaz always have issues with grammar and spelling?

I mean, "So we has downloaded", "if you reading this message", "contact information you will find at the bottom of this notes", "no contact made in closest time", "within 2 day since", etc.

Can't they even English properly? Seriously undermines their credibility...
 

DaniPoo

Well-Known Member
Member
Joined
Jan 2, 2013
Messages
795
Trophies
0
Age
32
XP
1,471
Country
Why do tech-savvy Hakaz always have issues with grammar and spelling?

I mean, "So we has downloaded", "if you reading this message", "contact information you will find at the bottom of this notes", "no contact made in closest time", "within 2 day since", etc.

Can't they even English properly? Seriously undermines their credibility...

wait what? Since when is English grammar a requirement for performing cyberattacks?
 
General chit-chat
Help Users
    AkiraKurusu @ AkiraKurusu: ^ That's why I could never get far into LGPE; now *that's* "too different", with so many changed...