Ubisoft fans need to change their passwords now
A recent disruption to Ubisoft gaming services could be down to a cyberattack by the group claiming to be behind the recent Nvidia and Samsung hacks.
Ubisoft is one of the world’s biggest video games companies, pushing out AAA titles such as the Far Cry and Assassin’s Creed series.
The company notified its users and customers of a temporary disruption, and whilst that announcement said nothing of the potential perpetrators, or how its endpoints were compromised, the Lapsus$ group shared the announcement a day later, together with a smirking face emoji.
We’re looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn’t take more than 60 seconds of your time, and entrants from the UK and US will have the chance to enter a draw for a £100 Amazon gift card (or equivalent in USD). Thank you for taking part.
In the follow-up discussion with their followers, the group “confirmed” not targeting Ubisoft’s customer information.
Ubisoft user data
Ubisoft said much the same in its announcement, stating that “at this time there is no evidence any player personal information was accessed or exposed as a by-product of this incident” and adding that it restored all of its services.
Still, the company suggested all users reset their passwords, just to be on the safe side.
Lapsus$ has been extremely active in these last couple of months. In early March, it breached Nvidia’s defenses, reportedly making off with a terabyte of sensitive data, including employee login credentials.
The group later said that the data stolen helped the group create a tool that bypasses the hash rate limiter placed on some of the RTX-30 series Nvidia GPUs, often used by Ethereum miners. The tool was allegedly being sold on the black market for $1 million, but whether or not it works, or if it’s just another virus, has not yet been confirmed.
Lapsus$ also said it compromised Samsung’s network, and stole almost 200 GB of some extremely sensitive data.
The data allegedly included the source code for every Trusted Applet (TA) installed in Samsung’s TrustZone environment used for sensitive operations; algorithms for all biometric unlock operations; bootloader source code for all recent Samsung devices; confidential source code from Qualcomm; source code for Samsung’s activation servers; full source code for technology used for authorizing and authenticating Samsung accounts, including APIs and services.
The group also claims to have hit Vodafone, but so far no data leaks have been confirmed, or company information revealed.
- Here’s our rundown of the best firewalls right now
Via: The Verge
Go to Source