Monday, March 17, 2025
HomeData BreachGaming Service R6DB Database deleted By Hackers and held for Ransom

Gaming Service R6DB Database deleted By Hackers and held for Ransom

Published on

SIEM as a Service

Follow Us on Google News

R6DB is a fan-powered online database that provides player statistics for Rainbow Six Siege. It went offline this weekend and the database wiped by the hackers and asked for a Ransom.

The incident took down their servers on Saturday and according to the companies statement some automated bot hit their servers and wiped the database.They kept the remote connection open from Development machine to Postgress Database server.

R6DB said they are currently working in the restoration process and they are not sure how many dates they can retrieve. Due to the hectic and unplanned September-migration, we didn’t have everything locked down yet, which led to this situation.

They don’t store any personal data’s so no need to be concerned about privacy issues.They basically lost all of their historical data.

Also Read Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails

Some profiles are gone says R6db We can re-index them when searched for, but that’s a step we can’t-do ourselves.progressions (aka historical data, aka charts) are fucked. They’ll fill up again over time, but the past is gone.

“Progressions (aka historical data, aka charts) are lost They’ll fill up again over time, but the past is gone,” R6DB said. “PC only aliases are half-lost. We still have some older data, but about a months worth of aliases is lost.”

R6DB decided to completely deploy a new server as the old server is compromised, they made the new server online but database restoration is still in progress.At the time of writing update 13:30 pm: pc restore is done, ps4 at 25%.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...

Telecom Giant NTT Confirms Data Breach Affecting 18,000 Corporate Customers

Japanese telecom giant NTT Communications (NTT Com) has confirmed a data breach that compromised...