Pokémon video game developer confirms its systems were breached by hackers

Omega Balla
Japanese video game developer Game Freak confirmed last week that it suffered a cyberattack earlier this year, resulting in a data leak.

Japanese video game developer Game Freak confirmed last week that it suffered a cyberattack earlier this year, resulting in a data leak.

The statement from the Tokyo-based co-owner of the popular Pokémon series followed reports that hackers breached the company’s systems and allegedly stole a large amount of data.

Pokémon has a large fanbase worldwide. As of 2024, more than 480 million Pokémon games have been sold globally, making it the third-best-selling video game franchise, behind Mario and Tetris.

Game Freak said the hack occurred in August when an unnamed threat actor gained unauthorized access to the company’s servers, leaking the personal data of more than 2,600 current and former employees, including their names and email addresses.

The company did not comment on whether unreleased and upcoming projects were leaked, as previously reported. Game Freak did not respond to a request for comment by the time of publication.

Over the weekend, gaming publication Nintendo Everything reported that source code for various Pokémon games, along with previously unseen Pokémon art, design documents and other development materials, had begun surfacing online. The outlet published examples of the allegedly leaked data.

Some of the purported leaked data was also posted on X by the CentroLeaks account, which describes itself as “the biggest source of Pokémon leaks, rumors, and news,” as well as on the PokeLeaks subreddit. The authenticity of these leaks remains unclear.

In response to the data leak, Game Freak said it has “rebuilt and re-inspected the server” and will continue to strengthen its security measures to prevent future incidents.

“We deeply apologize for the great inconvenience and concern caused to all those involved,” the company said, adding that it has contacted the affected employees individually.

Earlier this year, another Japanese company, Kadokawa, known for producing manga, anime and video games, was hit by a cyberattack. The company confirmed that some of its data was leaked in a ransomware attack claimed by the BlackSuit threat actor.

Japanese video game company Nintendo, another Pokémon co-owner, suffered a massive breach in 2020, when hackers leaked game and console source code, along with internal documentation and development tools.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Recently-patched Firefox bug exploited against Tor browser users

Next Post

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

Related Posts

Comprehensive Guide to Building a Strong Browser Security Program

The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape. With more than 90% of organizational network traffic flowing through browsers and web applications, companies are facing new and serious cybersecurity threats. These include phishing attacks, data leakage, and malicious extensions. As a result, the browser also becomes a vulnerability that
Avatar
Read More

Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Networks on Friday issued an informational advisory urging customers to ensure that access to the PAN-OS management interface is secured because of a potential remote code execution vulnerability. "Palo Alto Networks is aware of a claim of a remote code execution vulnerability via the PAN-OS management interface," the company said. "At this time, we do not know the specifics of the
Avatar
Read More

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,
Avatar
Read More