Media: CDPR stolen source code is laid out on the network

In February CD Projekt It suffered from a hacker attack: crackers stole many important data from the company’s servers, including the source code of several games, and put them up for auction. The media say that now the source began to upload to the network.

As Databreaches says.NET, Babuk cyber group recently changed the name of its site on Payload bin. Now this is a platform for independent leaks, where "there are no rules and bosses". As the first leak, under the guide, Payload Bin promised to upload “all the source code CD Projekt".

If you believe this screenshot Readme.txt, the network got the following:

source code and assets "Witcher 3" (There are assumptions that this is a version with E3, which, according to some users, looked more beautiful) and non-versions "Witcher 3",

In Readme.txt write that archives with the source code are encrypted: to get a password, you need to pay $ 10,000 in cryptocurrency for each game. The collected money will allegedly send to charity. But SDK has no passwords – they were laid out to warm up.

In the same Readme.txt claims that hackers have data on their hands CDPR, Corporate reports and non -disclosure agreements. They will be divided with the media, but they say, they will not lay out in open access. Probably among these data there is also personal information about the company’s employees.

June 4, 2021 Free Xbox games began at Warhammer 40,000: Inquisitor – Martyr, Warhammer: Chaosbane and Warhammer 40,000: Mechanicus

June 4, 2021 Palia – wonderful looks about your house in the village

Cyberpunk 2077

The Witcher 3: Wild Hunt

Thronebreaker: The Witcher Tales

The best comments

And here you have non -jar from real life

What a pity. Did not deserve the prostects of this, I am drawing

I sympathize with those who consider the norm to upload stolen source data

No, if the media www.eurokingclubcasino.co.uk is large and with a reputation, it is not laid out such things into open access. This usually happens if the source wants to prove that he is the one for whom he gives himself. The journalist in his material then writes something like “We confirmed the authenticity of the documents that our source provided”, but the documents themselves do not post.

At least – to reputation and financial losses, at the maximum – to theft of exclusive technologies and the loss of advantages over competitors. It becomes possible to create exploits based on the game code

The media are different, yes, but the large ones are not engaged in such. Say, if in the material for Bloomberg the journalist says that I saw the proofs, then I will believe him, because in Bloomberg a strict editorial policy on this score.

"The collected money will allegedly send to charity"

As they say, yoke in a voice. The valuable Robin Hudy of modernity stifled with blood prpotin and tears of Polish trainees work to sell it 10 mowers for access (it is not clear to whom, if they are being dancing, I do not think that they will be wounded up) but they will send this money to hungry children. How many children remained hungry due to hacking they did not think. How many poor trainees will still have to work out because of this disgrace, they also did not think.

The purest thoughts and noble souls are straight.

I would look and feel the assets of Cyberpan. Exclusively for learning. But I would definitely not have dealt with thieves and scammers because of this, even if I had that kind of money

This is really work., the codes who stole that they are heroes, not. They are shit -eaters

and in life, as a rule, the same wrappers..

There is an unspoken rule for such content: you can’t find it yourself – do not go.

Slightly different levels. It is one thing to post on the site files of old-console rums, which for the most part already rewritten from the source cartridges. There, neither the owner nor the Nintendam had a lot of efforts to attach.
Another thing is when a knowledgeable group penetrates the internal systems of a large company and pumps out data. They would not even start if they were not sure of their opportunity to stay non -dumb. Find people who can and want to catch them more frost. Particularly taking into account that many of these kulkhacks are hung in groups and just do not interfere with each other.

According to American laws, if the copyright holder does not defend his intellectual property, then he may lose these same rights over time.

Well, you are bending 🙂
employees of the studio of Violetovo, they have salaries
The only thing they should worry about is that the CDPR does not bother at all

Mass does not imply the distribution of all personal documents that fall at the disposal of the publication. This is already a matter of journalistic ethics.

In the same Readme.TXT claims that hackers have CDPR, corporate reports and non -disclosure agreements. They will be divided with the media, but they say, they will not lay out in open access. Probably among these data there is also personal information about the company’s employees.

It seems to me or for this they need to be announced on the federal wanted list? This is the secret information of the company and its employees who are clearly connected not only with the SDPR.

Guys, I would buy. But the last 100,000 in.e. I spent on a halt in the form of a character from Amouung US.

No, not directly
It is extremely unlikely that they have something similar in the contracts
But the bonuses may well depend

And I wrote in the context of his commentary
All labor invested in the source was already paid and the whole potential will also be paid
And in the deplorable financial condition of the company, management is primarily to blame, and not some hackers

Due to SDK draining for working with PS4, PS5, Switch and Xbox CDPR will have the most problems, probably.

Ninka is also not quite right. If she had a Magaz in which she could buy retro games and then suddenly someone would begin to freely distribute their games, then this is one thing. Here it would be possible to present to them that due to the action of their site, Ninka loses the loot.

But Ninka does not sell them. Yes, she laid out a few pieces by subscription and that’s it. And well, if these were some kind of improved version of the version, but no, nifiga. These are exactly the same games that came out a hundred years ago on its consoles, only adapted for playing. Moreover, some are so crooked that they work only in window mode.

She, like that smaug, sits on a heap of gold, does not use it herself, but she does not let gnomes even.

Private traders are not engaged in the tracking of cybercriminals, they do not have the necessary permits for this. State. organizations are slow almost everywhere. In addition, even to search for lonely amateur people at Nintedo, if my memory serves me, months have gone. At least, at least the group works, moreover, apparently quite competent, and hacking was committed relatively recently. I have no doubt that the CDPR turned to the special services, but if hackers know how to clean traces, it becomes almost impossible to find them in such a short time

Leave a Comment

Your email address will not be published. Required fields are marked *