Year after attack, GTA 5 source code leaked online: Report

Source code for GTA 5 was reportedly leaked online and was being shared on channels including Discord, Telegram and the dark web

Updated - December 26, 2023 03:46 pm IST

Published - December 26, 2023 02:43 pm IST

A year after a threat actor group hacked into Rockstar games and stole corporate data, the source code for GTA 5 was leaked online.

A year after a threat actor group hacked into Rockstar games and stole corporate data, the source code for GTA 5 was leaked online. | Photo Credit: AP

A year after a threat actor group hacked into Rockstar games and stole corporate data, the source code for GTA 5 was leaked online.

The source code was reportedly being shared on channels including Discord, Telegram and the dark web, a report from Bleeping Computer said.

The threat actor group behind the leak has earlier leaked pre-released videos of Grand Theft Auto 6. At the time the group had claimed to have stolen the GTA 5 and GTA 6 source code and assets, including test builds for the popular game.

In the initial attack that took place in 2022, threat actors hacked into Rockstar games and claimed to have gained access to the company’s internal Slack server and Confluence wiki.

(For top technology news of the day, subscribe to our tech newsletter Today’s Cache)

The threat actor group behind the attack is known for performing social engineering and SIM swapping attacks to breach corporate networks, and was reportedly behind cyberattacks on Uber, Microsoft, Rockstar Games, Okta, Nvidia, Ubisoft and Samsung.

And while active members of the group were arrested, some of the members are now believed to be active in loose-knit hacking collectives. The collective utilises social engineering, phishing, MFA fatigue and SIM swapping attacks to target the networks of large organisations.

While source code leaks may not be perceived as dramatic events, they pose a significant threat to an organization’s overall security. Source codes function as blueprints, detailing the inner workings of products offered by organizations. Exploiting vulnerabilities discovered in these codes can lead to further attacks on both the organization and its customers.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.