CD Projekt Red Refuses Ransom, Hackers Start Spreading Stolen Data

    CD Projekt Red Refuses Ransom, Hackers Start Spreading Stolen Data

    As they had threatened, the hackers who illegally obtained the sensitive data of CD Project Red in a recent cyber attack, they started to spread them online. In fact, earlier this week, CD Projekt Red revealed that she was the victim of a serious ransomware attack: the studio was then asked to contact the attackers and reach an economic agreement for a "ransom". but the software house refused. It is therefore not surprising that hackers are now translating their threats into reality, spreading fragments of the stolen material. Hackers did indeed leaking the source code of Gwent: The Witcher Card Game on some hacking forums.



    The fact that the title of the post was “CDProject Leak # 1” suggests that more will follow, in what is recognized as one double extortion technique, under which the authors continue to pressure by releasing more and more information, in the hope of convincing the "victim" to change their mind and pay the ransom. In fact, the hackers' message itself recommends expecting more material to be released today. According to a metadata analysis, the files were stolen as early as February 6. Another user on a private forum, rumored to be linked to the attack, also suggested that the next material to end up online will be about The Witcher 3, The Witcher 3 RTX, Cyberpunk 2077 and Thronebreaker: The Witcher Tales, and that most likely will happen today. Furthermore, according to the same user, this material will be auctioned on the same forum.

    While nothing major has been released yet, there could be serious consequences for CD Projekt Red. As we have recently seen with what happened with Capcom and Nintendo, most of the company secrets and software owned by the studio may already be in circulation, even if the Polish software house has assured that no sensitive data has been stolen.



    add a comment of CD Projekt Red Refuses Ransom, Hackers Start Spreading Stolen Data
    Comment sent successfully! We will review it in the next few hours.