Insomniac Games hackers leak 1.3 million files after demanding $2 million ransom

On December 12, Rhysida, a ransomware group, announced it had taken 1.67 terabytes of data — over 1.3 million files — from Sony's Insomniac Games and requested $2 million. Now, the one-week deadline for Insomniac Games to pay Rhysida has passed, and the group has made good on its threat to release the stolen information, Cyber Daily reports.

The data includes internal HR documents, screenshots of employees' Slack conversations, and more, but the main focus is the yet-to-be-released Wolverine video game. The released files contain details about level design, characters and actual screenshots from the game. There's also a signed publishing agreement between Sony and Marvel that lays out three upcoming X-Men games, the first being Wolverine, with the other two still unnamed. However, it details that Sony — which plans to spend $120 million per game — must release Wolverine by September 1, 2025, with the others due by the end of 2029 and 2033, respectively. 

Rhysida claims that it took the group only 20 to 25 minutes to get the domain administrator and that money was their sole motivation. "We knew that developers making games like this would be an easy target," a Rhysida spokesperson told Cyber Daily. "Sony has launched an investigation, but it would be better in the backyard."

Notably, Rhysida's initial ransom notice allowed anyone to bid on the data, not just Insomniac Games, and it appears some of it was bought. The ransomware group stated that any unsold data was released — but only 98 percent of stolen information is publicly available. Rhysida stipulated that any data purchased must not be resold, but who knows if the new owners will follow that rule.

Rhysida only targeted Insomniac Games within Sony, but in May, a separate attack gained access to 6,800 current and former employees' personal data. The attack, which ransomware group CLOP took credit for, became public knowledge in October.

This article originally appeared on Engadget at https://www.engadget.com/insomniac-games-hackers-leak-13-million-files-after-demanding-2-million-ransom-102134429.html?src=rss

Insomniac Games hackers leak 1.3 million files after demanding $2 million ransom

On December 12, Rhysida, a ransomware group, announced it had taken 1.67 terabytes of data — over 1.3 million files — from Sony's Insomniac Games and requested $2 million. Now, the one-week deadline for Insomniac Games to pay Rhysida has passed, and the group has made good on its threat to release the stolen information, Cyber Daily reports.

The data includes internal HR documents, screenshots of employees' Slack conversations, and more, but the main focus is the yet-to-be-released Wolverine video game. The released files contain details about level design, characters and actual screenshots from the game. There's also a signed publishing agreement between Sony and Marvel that lays out three upcoming X-Men games, the first being Wolverine, with the other two still unnamed. However, it details that Sony — which plans to spend $120 million per game — must release Wolverine by September 1, 2025, with the others due by the end of 2029 and 2033, respectively. 

Rhysida claims that it took the group only 20 to 25 minutes to get the domain administrator and that money was their sole motivation. "We knew that developers making games like this would be an easy target," a Rhysida spokesperson told Cyber Daily. "Sony has launched an investigation, but it would be better in the backyard."

Notably, Rhysida's initial ransom notice allowed anyone to bid on the data, not just Insomniac Games, and it appears some of it was bought. The ransomware group stated that any unsold data was released — but only 98 percent of stolen information is publicly available. Rhysida stipulated that any data purchased must not be resold, but who knows if the new owners will follow that rule.

Rhysida only targeted Insomniac Games within Sony, but in May, a separate attack gained access to 6,800 current and former employees' personal data. The attack, which ransomware group CLOP took credit for, became public knowledge in October.

This article originally appeared on Engadget at https://www.engadget.com/insomniac-games-hackers-leak-13-million-files-after-demanding-2-million-ransom-102134429.html?src=rss

Xfinity breach may have affected as many as 35.8 million customers

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing and it has informed law enforcement about the incident.

In a filing with Maine's attorney general's office, Xfinity owner Comcast disclosed that the intrusion has impacted 35.8 million people. As TechCrunch points out, Comcast had 32.3 million broadband customers as of the end of September, indicating that the vast majority of Xfinity customers have been affected by the breach.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

Update 12/19 8:00AM ET: Updated to note the number of people who were impacted by the breach.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

Xfinity suffered a data breach but doesn’t know quite how bad it was

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing, which may explain why it hasn't disclosed the number of customers who have been affected. Xfinity also notes that it informed law enforcement about the incident.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

Xfinity suffered a data breach but doesn’t know quite how bad it was

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing, which may explain why it hasn't disclosed the number of customers who have been affected. Xfinity also notes that it informed law enforcement about the incident.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

BOOX Note Air3 monochrome and color ePaper tablets

BOOX Note Air3 monochrome ePaper tablets

The Onyx BOOX Note Air3 is a cutting-edge ePaper tablet that combines advanced technology with a user-friendly design. This comprehensive review will delve into the features of the Note Air3, including its impressive display, powerful processor, and innovative note-taking capabilities. The Note Air3’s display is one of its standout features. It boasts a 10.3 inch, […]

The post BOOX Note Air3 monochrome and color ePaper tablets appeared first on Geeky Gadgets.

How to Set Up Call Forwarding on the iPhone

In today’s fast-paced world, smartphone usage has become ubiquitous, and managing incoming calls can be a challenge, especially when you’re away from your device or need to prioritize specific calls. To address these scenarios, Apple provides two valuable features called Call Forwarding and Call Waiting. These features empower you to control how your iPhone handles […]

The post How to Set Up Call Forwarding on the iPhone appeared first on Geeky Gadgets.

AAEON GENE-EHL7 3.5-inch Single Board Computer (SBC) mini PC

AAEON GENE-EHL7 3.5-inch SBC PC

The world of embedded solutions has seen a new arrival with the launch of AAEON’s new Single Board Computer (SBC), the GENE-EHL7. AAEON, a provider of embedded solutions, has added this innovative product to its 3.5″ SubCompact Board product line, offering a host of features aimed at smart retail, smart city, and industrial automation solutions. […]

The post AAEON GENE-EHL7 3.5-inch Single Board Computer (SBC) mini PC appeared first on Geeky Gadgets.

Samsung announces two new ISOCELL Vizion Sensors

Samsung ISOCELL Vizion Sensors

Samsung has unveiled two new ISOCELL Vizion Sensors that are designed for robotics and XR applications, these are the ISOCELL Vizion 63D and ISOCELL Vizion 931 and Samsung has said that these are designed for a range of next-generation industrial, mobile, and commercial cases. Particularly, Samsung’s ISOCELL Vizion 63D is an indirect ToF (iToF) sensor […]

The post Samsung announces two new ISOCELL Vizion Sensors appeared first on Geeky Gadgets.