Ransomware Achieves High Score Over Capcom

Video Games are one of the biggest enterprises in the modern world with many industry giants providing access to online gaming platforms.

However, what happens when the games you love to play take away more than your player lives? This is the current situation many people at Japanese game powerhouse Capcom have been faced with after being victim to a Ransomware attack that led to the theft of sensitive customer and employee information.

Greatest Hits to Greatest Losses

Anyone who has even a passing interest in video games will know of Capcom’s history of engagement with players, with such illustrious games as Street Fighter, Resident Evil and Mega Man among thousands of fan favourite franchises that gamers flock to.

On November 2nd, a new game was in development, but not for the benefit of Capcom or its legions of dedicated fans. Instead it was a singular cyber attacker who accessed delicate information on employees and users which led to Capcom implementing a quick shut down over portions of their network to blockade the spread of the growing online infection.

Whilst investigating the attack it was discovered that the Ragnar Locker ransomware operation caused Capcom’s cyber attack when a security researcher discovered a sample of the malware used in the attack. Whilst a majority of all human ransomware operations steal unencrypted files before encrypted devices as a strategy for double-extortion, Capcom had indicated that no data has been accessed from that area.

However, in the following statement, Capcom indeed admitted that threat actors had accessed customer and employee data as well as confidential corporate documents.

Compromised Data

Following the attack, it was revealed that the hackers had stolen customer names, addresses, genders, email addresses, phone numbers, birth dates, photos as well as investor names and amounts of shareholdings.

As it pertains to employees of the company, the information exposed ranged from all of the above but also passport information and signatures.

As far as company information away from employee and customer details, confidential documentation such as sales reports and financial information, as well as human resources information, development documents and business partner information was fully exposed in the online raid.

Capcom assures that no credit card information or payment transactions were accessed due to their preference of using third party providers for these areas.

For Customers

As it transpires that account login details and passwords were not compromised during the attack, customers should be aware of any contact from false entities claiming to be Capcom for information through phone, text or email.

Threat actors will make use of the information they have procured to target phishing attacks to gain even further information from the employees and customers. If you receive an email stating themselves as Capcom and requesting information, double-check the validity and contact an official Capcom channel for clarity of it’s origin.

For more information on data breach news, engage with Whitehall Media and our live events and join the fight in how to protect data online.