Recently, one of the largest video game distributors in the world, EA (Electronic Arts) sports has undergone a severe cyberattack. As per the reports, a hacker group stole the source code of some video games of EA Sports.
Not only that, even hackers also gained access to internal development tools like “Frostbite,” it’s the graphics engine that powered the titles like Battlefield 2042 possible.
On several private internet forums, the hackers revealed that they have attacked all EA services and managed to gain illicit access to the internal networks of EA Sports. That’s why as a result, they have managed to steal over 780 GB of confidential files from Electronic Arts.
The stolen source codes include two widely popular games in the gaming community, FIFA 21, and The Sims. Apart from Frostbite, the hackers have also claimed that they have also managed to steal the patented works and other internal development tools (SDK) of EA.
While the EA press announced that the users didn’t have to worry about the data leak, since, this security breach hasn’t affected the user data.
After the discovery of this breach, to ensure the users’ security, EA has already taken all the necessary security measures, and the experts at EA are also working with the law enforcement officials as well to investigate the whole matter.
The hackers claimed that they managed to gain access to all the EA data and services worth $28 million. Apart from this, they have also pronounced that the buyer will receive the chance to fully abuse all the EA services as a reward.
Here’s the list of all stolen data:-
The hackers have already presented their evidence that they fully have the stolen data from EA with them, but the hackers have not yet made any hacked source codes and tools public; however, they have shown their intention to sell the stolen data.
Moreover, EA is not the only gaming company that suffered such cyberattacks, as this year, last February, CD Projekt RED also experienced a ransomware attack that dramatically curtailed its work rate.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.
Some router models have identified a security vulnerability that allows attackers to bypass authentication. To exploit this vulnerability, an attacker…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt Strike Beacon, targeting systems in Ukraine.…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…