CDPR Breached in Cyberattack, Insists It Won't Pay Ransom
Netrunners at it
Game studio CD Projekt Red has been under a lot of fire recently for the messy Cyberpunk 2077 launch, and now it seems the company isn't getting a break. In a tweet, CDPR announced that it was subject to a targeted cyber-attack, compromising some of the company's internal systems.
The attackers claim to have obtained full source code for Cyberpunk 2077, The Witcher 3, Gwent, an unreleased version of The Witcher 3, along with heaps of accounting, legal, admin, HR, and investor relations documents, and are threatening to send them to journalists if CDPR doesn't pay a ransom.
Important Update pic.twitter.com/PCEuhAJosRFebruary 9, 2021
The attackers claim to have encrypted all the server's data, but CD Projekt Red is currently restoring the data from a backup. Something that the attackers already anticipated, apparently.
CD Projekt Red says that it will not give in to the demands of the attackers, even if that means the data will be released. CDPR claims that to the best of their knowledge, no personal data of players has been compromised. CDPR is currently working together with law enforcement agencies to shed further light on the breach.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Niels Broekhuijsen is a Contributing Writer for Tom's Hardware US. He reviews cases, water cooling and pc builds.
-
TimmyP777 Something about this seems fishy. The old "terminology" and level of enthusiasm displayed in that text file just doesn't seem...Reply -
COLGeek Another good reason to have a robust backup plan. Paying ransom often results in one of two outcomes.Reply
The crooks take the money and run, with nothing unlocked.
Or, since they were paid once, they ask for more (with nothing unlocked).
The crooks are the only possible winners here.
Lesson learned is to backup your stuff. -
cryoburner
I'm sure they fully expected a company like this to have practically everything backed up anyway, so I kind of doubt they expected to get paid any significant amount of money to unlock the files. The ransom in this case would mostly be for not releasing that data to the public. If there was stuff in those files that the company really didn't want revealed, it might potentially consider paying.COLGeek said:Lesson learned is to backup your stuff. -
GenericUser COLGeek said:Another good reason to have a robust backup plan. Paying ransom often results in one of two outcomes.
The crooks take the money and run, with nothing unlocked.
Or, since they were paid once, they ask for more (with nothing unlocked).
The crooks are the only possible winners here.
Lesson learned is to backup your stuff.
This source here states that, in at least their sample size of 5,000 IT managers of companies that paid a ransom, 95% of them got their data back. It would be bad for business as a ransomware operator if none of them ever unlocked the data, because then nobody would bother paying a ransom for files they know they won't get back anyways.
That being said, paying up only encourages more of the bad behavior because it proves that ransomware attacks are effective, so having a solid backup strategy is always a good plan, along with proper security. -
hotaru.hino
Sometimes that's not viable. You still need external access to the internet and most people are going to need that. So do you buy two computers for everyone? And then you need a system in place to safely transfer files over the gap because it only takes one person who didn't actually scan that file they brought over for malware and whoops, now your internal network is compromised.SSGBryan said:Yet another example of why you should air gap your internal IT structure.
Having an off-site backup system in place is cheaper and just as effective. -
jkflipflop98 SSGBryan said:Yet another example of why you should air gap your internal IT structure.
Yeah, down here in reality that's not really an option most of the time. Doubly so in the Work From Home era. -
SSGBryan I have air-gaped with a netbook.Reply
I am using an old HP workstation now.
Doesn't have to be expensive, last gen hardware is perfectly fine for it. -
hotaru.hino
How do you access a company's air-gapped network if they established a WFH mandate and all of your important work is on said air-gapped network?SSGBryan said:I have air-gaped with a netbook.
I am using an old HP workstation now.
Doesn't have to be expensive, last gen hardware is perfectly fine for it.