Categories: Data Breach

Gaming Service R6DB Database deleted By Hackers and held for Ransom

R6DB is a fan-powered online database that provides player statistics for Rainbow Six Siege. It went offline this weekend and the database wiped by the hackers and asked for a Ransom.

The incident took down their servers on Saturday and according to the companies statement some automated bot hit their servers and wiped the database.They kept the remote connection open from Development machine to Postgress Database server.

R6DB said they are currently working in the restoration process and they are not sure how many dates they can retrieve. Due to the hectic and unplanned September-migration, we didn’t have everything locked down yet, which led to this situation.

They don’t store any personal data’s so no need to be concerned about privacy issues.They basically lost all of their historical data.

Also Read Deloitte Hacked by Cyber Criminals and Revealed Client & Employee’s Secret Emails

Some profiles are gone says R6db We can re-index them when searched for, but that’s a step we can’t-do ourselves.progressions (aka historical data, aka charts) are fucked. They’ll fill up again over time, but the past is gone.

“Progressions (aka historical data, aka charts) are lost They’ll fill up again over time, but the past is gone,” R6DB said. “PC only aliases are half-lost. We still have some older data, but about a months worth of aliases is lost.”

R6DB decided to completely deploy a new server as the old server is compromised, they made the new server online but database restoration is still in progress.At the time of writing update 13:30 pm: pc restore is done, ps4 at 25%.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

1 day ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

1 day ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

1 day ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

1 day ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

2 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

2 days ago