ShinyHunters claim the hack of Rockstar Games breach and started leaking data

Security Affairs
Actively Exploited

Overview

A significant data breach involving Rockstar Games has been reported, with a leak of 8.1GB of sensitive data attributed to the hacking group ShinyHunters. The leaked files include anti-cheat source code, player analytics, and game assets, along with Zendesk support tickets. This breach raises concerns about the security of user data and the integrity of the games produced by Rockstar. Game developers and players alike should be aware of the potential risks associated with such leaks, including the possibility of cheating and exploitation in online games. The data was reportedly obtained through a third-party service called Anodot, highlighting the vulnerabilities that can arise from third-party integrations.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Rockstar Games, including its online gaming platforms and related services.
  • Action Required: Companies should evaluate their data security measures, especially concerning third-party integrations and anti-cheat mechanisms.
  • Timeline: Newly disclosed

Original Article Summary

Leak of 8.1GB data tied to Rockstar Games includes anti-cheat code, game data, analytics and more, reportedly exposed by ShinyHunters. An 8.1GB data leak reportedly linked to Rockstar Games has surfaced, with files shared by ShinyHunters after being obtained via Anodot. The dataset includes anti-cheat source code, player analytics, game assets, Zendesk support tickets and […]

Impact

Rockstar Games, including its online gaming platforms and related services.

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Companies should evaluate their data security measures, especially concerning third-party integrations and anti-cheat mechanisms.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Data Breach.

Related Coverage

Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments

SecurityWeek

A researcher has revealed a new attack method called 'Comment and Control' that targets AI systems like Claude Code, Gemini CLI, and GitHub Copilot Agents. This technique exploits prompt injection vulnerabilities through comments in code, allowing attackers to manipulate the AI's responses. The implications of this vulnerability are significant, as it could lead to unintended actions by the AI, potentially compromising the integrity of code generation and automation tools widely used in software development. Developers and organizations utilizing these AI tools should be aware of this risk and take necessary precautions to safeguard their systems. As AI becomes more integrated into development workflows, understanding and mitigating such vulnerabilities is crucial.

Apr 16, 2026

US nationals behind DPRK IT worker 'laptop farm' sent to prison

BleepingComputer

Two U.S. nationals have been sentenced to prison for facilitating a scheme that allowed North Korean IT workers to impersonate U.S. residents. This operation involved these workers securing jobs with over 100 companies, including many Fortune 500 firms, by using fake identities. The individuals helped these North Korean nationals bypass legal employment barriers, raising serious security concerns about foreign influence and the potential for espionage. This incident not only highlights vulnerabilities in hiring practices but also points to the broader risks associated with remote work and cybersecurity in the global labor market. Companies need to be vigilant in verifying the identities of remote employees to prevent similar incidents.

Apr 16, 2026

EU cybersecurity standards are at risk if supplier ban passes

Help Net Security

The European Telecommunications Standards Institute (ETSI) has submitted a position paper to the European Commission regarding the proposed Cybersecurity Act 2 (CSA2). The paper raises concerns about two key provisions: expanding the European Union Agency for Cybersecurity's (ENISA) role in setting technical standards and a proposed ban on entities from countries deemed to pose cybersecurity risks from participating in European standardization efforts. This ban could impact the development of cybersecurity standards in the EU, potentially limiting collaboration and innovation. The ETSI argues that such restrictions could hinder the overall effectiveness of European cybersecurity measures, affecting businesses and consumers alike. The outcome of this proposal will be significant for the future of cybersecurity in Europe.

Apr 16, 2026

UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign

The Hacker News

Ukraine's Computer Emergencies Response Team (CERT-UA) has reported a new malware campaign targeting government and healthcare institutions, particularly clinics and emergency hospitals. This campaign, which took place between March and April, focuses on stealing sensitive data from users of Chromium-based web browsers and WhatsApp. The attackers are believed to be exploiting vulnerabilities to deliver this data-theft malware, raising concerns about the security of critical health information and government data. With healthcare systems already strained, this type of cyberattack poses significant risks not only to patient privacy but also to the overall functioning of essential services in Ukraine. The ongoing conflict and instability in the region make this situation particularly alarming, as attackers may aim to cause further disruption.

Apr 16, 2026

Middle East-based brute-force cyber intrusions surge

SCM feed for Latest

Cybersecurity researchers have reported a significant increase in brute-force authentication attacks targeting network devices, particularly in the Middle East. In the first quarter of 2026, nearly 90% of these intrusions originated from that region. This surge in attacks raises concerns for organizations relying on network devices for their operations, as attackers are likely exploiting weak passwords to gain unauthorized access. The alarming trend suggests that companies need to reinforce their security measures, including implementing stronger password policies and multi-factor authentication. With the rising frequency of these attacks, vigilance is essential to protect sensitive data and maintain network integrity.

Apr 15, 2026

New AgingFly malware used in attacks on Ukraine govt, hospitals

BleepingComputer

Researchers have discovered a new type of malware called 'AgingFly' that has been used in attacks targeting Ukrainian government agencies and hospitals. This malware is designed to steal authentication data from users of Chromium-based browsers and WhatsApp messenger, posing a significant risk to sensitive information. The attacks raise concerns about the security of critical infrastructure and public services, especially in a region already facing geopolitical tensions. As cybercriminals continue to evolve their tactics, it's crucial for organizations to enhance their defenses against such threats. Users are advised to be vigilant and consider updating their security practices to protect against potential data breaches.

Apr 15, 2026