Write what you are looking for and press enter to begin your search!
Live News
CD Projekt Under Cyber Attack; Game Codes & Internal Documents Held Under Ransom [Update]
By Jonathan ToyadVerified|February 9, 2021|0 Comment
Update (11/2): Seems like the hackers have started to make good on their threats. They recently leaked the source code for Gwent on a hacking forum with Mega.nz archive links; they were later deactivated.
Seems like the woes of Cyberpunk 2077’s creators are far from over.
An unidentified group has gained unauthorized access to CD Projekt’s internal network and threatens to release its major works to the public. The ransomer said that the company has 48 hours before it releases the full copies of the following games:
The hacker group has also allegedly dumped all of the company’s documents related to accounting, administration, legal, HR, investor relations, and more. However, this compromise system did not contain any player personal data or user info. It’s mostly just CD Projekt’s internal documents and safeguarded code of their games.
Important Update pic.twitter.com/PCEuhAJosR
— CD PROJEKT RED (@CDPROJEKTRED) February 9, 2021
This attack was probably done in retaliation against the poor release reception of Cyberpunk 2077. Or a group who had one too many losses in Gwent. In any case, CD Projekt has announced that it has approached the relevant authorities to investigate this breach of security.
https://twitter.com/CDPROJEKTRED/status/1359048125403590660/photo/1
By Alleef AshaariVerified|April 29, 2024
Happy birthday, Donald! In 2024, the feisty and lovable Donald Duck turns 90. His first official appearance was in the short film "The Wise Little Hen...
By Alleef AshaariVerified|January 6, 2020
Dota 2 fans boast of having one of the largest esports communities and players bases in the world. Little do these people know that the MOBA game is c...
By Lewis LarcombeVerified|February 23, 2023
Ironmace, the developers of Dark and Darker, have recently come under fire due to allegations that their game uses stolen assets and code. However, th...
By Jonathan Toyad|April 9, 2025
By Kakuchopurei|April 2, 2025
By Kakuchopurei|March 31, 2025
By Jonathan Toyad|March 28, 2025
By Kakuchopurei|February 17, 2025
By Ali'sha Harris|February 16, 2025
By Jonathan Toyad|April 28, 2025
By Jonathan Toyad|April 26, 2025
By Jonathan Toyad|April 25, 2025
By Jonathan Toyad|April 9, 2025
By Kakuchopurei|April 2, 2025
By Kakuchopurei|March 31, 2025
By Jonathan Toyad|March 28, 2025
By Kakuchopurei|February 17, 2025
By Ali'sha Harris|February 16, 2025
By Jonathan Toyad|April 9, 2025
By Kakuchopurei|April 2, 2025
By Kakuchopurei|March 31, 2025
By Jonathan Toyad|March 28, 2025
By Kakuchopurei|February 17, 2025
By Ali'sha Harris|February 16, 2025
Copyright @ Kakuchopurei 2025