A two-minute-long video of Insomniac’s Wolverine game was leaked and has been circulating online. Following the successful release of Insomniac’s Spider-Man 2, the American game developer was hacked, resulting in a reported 1.67 terabytes of data comprising over 1.3 million files, some of which contained sensitive information about Insomniac staff members.
It known that the ransomware group known as Ryhsida was behind the hack, after it announced that it had stolen data. In the same timeframe, the group announced a seven-day deadline and an auction price for the data starting at 50 BTC, or about US$2 million (~RM9.31 million).
They also leaked information about all the studio’s planned projects:
• Marvel's Venom – 2025
• Marvel's Wolverine – 2026
• Marvel's Spider-Man 3 – 2028
• Ratchet and Clank – 2029
• X-men – 2030
• Marvel's Spider-Man 2, Marvel's Wolverine and Marvel's— NeuroPlayCove (@NeuroPlayCove) December 19, 2023
Among the information that was leaked were level designs and character designs from the upcoming Wolverine game, as well as future, unannounced Insomniac and Sony titles. According to the leaks, Wolverine is reportedly the first of a planned X-Men video game trilogy. Furthermore, Insomniac was said to be working on a third instalment of Spider-Man, a Venom title, as well as a new Ratchet and Clank game.
Cyber Daily has reached out to the hacker group, with the group stating that they were aware of who they were attacking and that “developers making games like this would be an easy target.” A spokesperson for Ryhsida also added that hacking into the system was not a problem and that it only took them around “20–25 minutes of hacking the network.”
This isn’t the first time Sony has been hacked; the company has been the target of several hacks throughout the years, the most prominent from 2014 when it was hacked by alleged North Korea hackers and Ransomed.vc. In 2023 alone, other video game companies, such as Rockstar Games and Riot Games, were also hacked.
Last month, the US Department of Justice and the Cybersecurity and Infrastructure Security Agency issued a cybersecurity alert about Rhysida. The report stated that the group used VPNs to connect to internal company systems from the outside and was often detected using compromised credentials to enter the system alongside multifactor authentication.
(Source: The Verge, Cyber Daily, Reddit)
Follow us on Instagram, Facebook, Twitter or Telegram for more updates and breaking news.