Sony investigating potential ransomware attack on Insomniac Games unit

Omega Balla
Sony said it is looking into reports of a ransomware attack on its subsidiary Insomniac Games, the studio behind popular titles like Spider-Man, Spyro the Dragon and more.

Sony said it is looking into reports of a ransomware attack on its subsidiary Insomniac Games, the studio behind popular titles like Spider-Man, Spyro the Dragon and more.

On Tuesday, the Rhysida ransomware gang claimed to have attacked Insomniac Games, giving the video game developer six days to respond to their undisclosed ransom demand.

In a statement to Recorded Future News, a Sony Interactive Entertainment (SIE) spokesperson said they are aware of reports that “Insomniac Games has been the victim of a cyber security attack.”

“We are currently investigating this situation,” they said. “We have no reason to believe that any other SIE or Sony divisions have been impacted.”

The Rhysida ransomware gang – named after centipedes – first emerged in late May 2023 and has already claimed major attacks on government institutions in Portugal, the Dominican Republic, Kuwait, Chile and the Caribbean island of Martinique.

The gang drew headlines in the U.S. for its devastating attack on Prospect Medical Holdings – which operates 16 hospitals in several states and was forced to redirect ambulances as a result of the incident.

In November, the top cybersecurity agencies in the U.S. released an advisory on the gang’s operations warning that it has “predominantly been deployed against the education, healthcare, manufacturing, information technology, and government sectors since May 2023.” The advisory cites several cybersecurity reports drawing links between the gang and another ransomware operation named Vice Society.

Insomniac Games would be far from the first gaming studio to face attack in recent years, with dozens of the biggest game makers dealing with ransomware incidents and more.

Gaming giants like Rockstar, Activision Blizzard, Bandai Namco, Capcom, CD Projekt Red and Riot Games have each dealt with cybersecurity incidents over the last three years. Both Ubisoft and Crytek were hit by the Egregor ransomware gang in 2020.

In 2021, cyberattackers began selling access to Electronic Arts games and servers after a hack. A hacker defaced the in-game interface of Apex Legends in June 2021 and French video game maker Ubisoft said in December that a misconfiguration in its IT infrastructure exposed gamer data for players of its Just Dance video game series.

BriefsCybercrimeTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Russian foreign intelligence service spotted exploiting JetBrains vulnerability

Next Post

Kraft Heinz reviewing claims of cyberattack but internal systems ‘operating normally’

Related Posts

Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw

Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor's Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in Zimbra's postjournal service that could enable unauthenticated attackers to
Avatar
Read More

Critical Flaws in Traccar GPS System Expose Users to Remote Attacks

Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system that could be potentially exploited by unauthenticated attackers to achieve remote code execution under certain circumstances. Both the vulnerabilities are path traversal flaws and could be weaponized if guest registration is enabled, which is the default configuration for Traccar 5, Horizon3.ai
Avatar
Read More