Categories: Data Breach News InfoSec News

Capcom hack: Up to 350,000 people’s information stolen

Published by
RiSec.n0tst3

Video-game-maker Capcom has warned a ransomware attack might have compromised gamers’ personal information.

Up to 350,000 people could be affected, it said, and some of its own financial information had been stolen.

The Japanese developer is best known for franchises such as Resident Evil, Street Fighter, and Monster Hunter.

A week-and-a-half earlier, it had said there was no indication customer information had been accessed.

Digitally scrambled

But in an update on Monday, Capcom confirmed its servers had been hit by an attack on 2 November.

Ransomware is malicious software that typically threatens to block a victim’s access to their own records unless a blackmail payment is made.

In this case, the attackers digitally scrambled some of the data on Capcom’s servers, making it impossible to view or amend, and destroyed some files outright.

The Ragnar Locker hacker group had then demanded to be paid to undo the encryption involved, Capcom said.

On Ragnor Locker’s dark-net webpage, the hackers didn’t just post Capcom’s data but also an ominous message.

In broken English they wrote the Japanese company didn’t “make a right decision and save data from leakage”.

This – and the fact Capcom is openly talking about the hack – suggests the company chose not to pay the cyber-criminals’ extortion demand.

Many, including law enforcement, would actually see this as absolutely the right decision.

For 18 months, police the world over have been desperately imploring ransomware victims not to pay hackers.

The groups have made millions from companies, which often feel they have no other option but to fork out.

But it seems Capcom has found a way through without yielding.

No doubt the incident has affected the firm’s reputation and some sensitive data is already surfacing online.

But reading the disappointment in Ragnor Locker’s statement is refreshing and rare.

So far, Capcom has confirmed only nine people’s personal information was definitely compromised, all current or former employees.

But up to 350,000 customers, business partners, and other employees might also be affected, it said.

Although, it could not be sure because its own logs had been “lost as a result of the attack”.

The information includes different combinations of names, addresses, birthdays, phone numbers and email addresses, depending on why the data was gathered.

For example, some was from Japanese customer support and some from the American Capcom store or e-sports operation.

‘Deepest apologies’

“None of the at-risk data contains credit-card information,” Capcom’s statement said.

“All online transactions… are handled by a third-party service provider.

“And as such, Capcom does not maintain any such information internally.”

The company also said it was safe for gamers to continue to play its games online and to use its websites.

Police have been notified, as have the Japanese and UK data-protection watchdogs.

“Capcom would once again like to reiterate its deepest apologies for any complications or concerns caused by this incident,” it said.

“As a company that handles digital content, it is regarding this incident with the utmost seriousness.”

Bookmark
Please login to bookmark Close
Social Comments Box
Connect
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 27 November 2020 1:22 PM

RiSec.n0tst3

Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

Leave a Comment
Published by
RiSec.n0tst3
Tags: 350000 capcom compromised hacked potentially ransomware servers

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago