Thursday, July 18, 2024
EHA

EA Sports Hacked – Hackers Stolen Source Code With 780 GB of Data

Recently, one of the largest video game distributors in the world, EA (Electronic Arts) sports has undergone a severe cyberattack. As per the reports, a hacker group stole the source code of some video games of EA Sports. 

Not only that, even hackers also gained access to internal development tools like “Frostbite,” it’s the graphics engine that powered the titles like Battlefield 2042 possible.

On several private internet forums, the hackers revealed that they have attacked all EA services and managed to gain illicit access to the internal networks of EA Sports. That’s why as a result, they have managed to steal over 780 GB of confidential files from Electronic Arts.

The stolen source codes include two widely popular games in the gaming community, FIFA 21, and The Sims. Apart from Frostbite, the hackers have also claimed that they have also managed to steal the patented works and other internal development tools (SDK) of EA.

While the EA press announced that the users didn’t have to worry about the data leak, since, this security breach hasn’t affected the user data. 

After the discovery of this breach, to ensure the users’ security, EA has already taken all the necessary security measures, and the experts at EA are also working with the law enforcement officials as well to investigate the whole matter.

Hackers steal data worth $28 million

The hackers claimed that they managed to gain access to all the EA data and services worth $28 million. Apart from this, they have also pronounced that the buyer will receive the chance to fully abuse all the EA services as a reward.

Here’s the list of all stolen data:-

  • FrostBite game engine source code and debug tools
  • FIFA 21 matchmaking server code
  • FIFA 22 API keys and SDK & debug tools
  • debug tools, SDK, and API keys
  • proprietary EA games frameworks
  • XBOX and SONY private SDK & API key
  • XB PS and EA pfx and crt with key

The hackers have already presented their evidence that they fully have the stolen data from EA with them, but the hackers have not yet made any hacked source codes and tools public; however, they have shown their intention to sell the stolen data.

Moreover, EA is not the only gaming company that suffered such cyberattacks, as this year, last February, CD Projekt RED also experienced a ransomware attack that dramatically curtailed its work rate.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Website

Latest articles

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...

Cybercriminals Exploit Attack on Donald Trump for Crypto Scams

Researchers at Bitdefender Labs remain ever-vigilant, informing users about the latest scams and internet...

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations...

Volcano Demon Group Attacking Organizations With LukaLocker Ransomware

The Volcano Demon group has been discovered spreading a new ransomware called LukaLocker, which...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles