Hackers broke into the network of gaming giant Electronic Arts (EA), stealing 750 GB of data, including game source code and debug tools.
EA is the creator and publisher of a number of well-known video game titles including Madden NFL, EA SPORTS FIFA, Battlefield, The Sims, and Need for Speed.
The data breach was confirmed by EA, who stated that it was not a ransomware attack and that only a small quantity of code and related tools were taken.
They stated that they do not anticipate any negative consequences of their games or business.
The hackers that are selling EA’s data claim to have obtained the entire FIFA source code, EA game clients, and in-game cash points.
Cybercriminals use in-game points as a means of money laundering.
At this time, the details of how the threat actor gained access to the EA’s network are unknown.
Customers willing to pay $28 million for the stolen data will also acquire “full capability of exploiting on all EA services,” according to the attackers, who claim to have access to all of EA’s systems.
EA has about 450 million registered users all around the world.
The following information was stolen from EA data breach as part of the enormous data dump.
- FrostBite game engine source code and debug tools
- FIFA 21 matchmaking server code
- FIFA 22 API keys and SDK & debug tools
- debug tools, SDK, and API keys
- proprietary EA games frameworks
- XBOX and SONY private SDK & API key
- XB PS and EA pfx and crt with key
The attackers also posted pictures of directory listings and source code as proof that the data they took was real.
Kela’s Dark Beast intelligence agency discovered the attackers’ posts marketing the stolen data on numerous markets and hacking forums.
The investigation is still ongoing, according to an EA spokeswoman, and no player data was accessed, therefore there is no risk to player privacy.
The company has already made security enhancements as a result of the event, and they do not expect any negative effects on their games or business.
As part of the ongoing investigation, he noted, they are actively collaborating with law enforcement officers and other experts.
Also read: JBS ransomware attack: paid $11 million to REvil ransomware
You might also like: Fujifilm ransomware attack: shuts down parts of its network globally
You might also like: Cybercriminals could possibly exploit Samsung pre-installed apps for spying