Pokémon video game developer confirms its systems were breached by hackers

Omega Balla
Japanese video game developer Game Freak confirmed last week that it suffered a cyberattack earlier this year, resulting in a data leak.

Japanese video game developer Game Freak confirmed last week that it suffered a cyberattack earlier this year, resulting in a data leak.

The statement from the Tokyo-based co-owner of the popular Pokémon series followed reports that hackers breached the company’s systems and allegedly stole a large amount of data.

Pokémon has a large fanbase worldwide. As of 2024, more than 480 million Pokémon games have been sold globally, making it the third-best-selling video game franchise, behind Mario and Tetris.

Game Freak said the hack occurred in August when an unnamed threat actor gained unauthorized access to the company’s servers, leaking the personal data of more than 2,600 current and former employees, including their names and email addresses.

The company did not comment on whether unreleased and upcoming projects were leaked, as previously reported. Game Freak did not respond to a request for comment by the time of publication.

Over the weekend, gaming publication Nintendo Everything reported that source code for various Pokémon games, along with previously unseen Pokémon art, design documents and other development materials, had begun surfacing online. The outlet published examples of the allegedly leaked data.

Some of the purported leaked data was also posted on X by the CentroLeaks account, which describes itself as “the biggest source of Pokémon leaks, rumors, and news,” as well as on the PokeLeaks subreddit. The authenticity of these leaks remains unclear.

In response to the data leak, Game Freak said it has “rebuilt and re-inspected the server” and will continue to strengthen its security measures to prevent future incidents.

“We deeply apologize for the great inconvenience and concern caused to all those involved,” the company said, adding that it has contacted the affected employees individually.

Earlier this year, another Japanese company, Kadokawa, known for producing manga, anime and video games, was hit by a cyberattack. The company confirmed that some of its data was leaked in a ransomware attack claimed by the BlackSuit threat actor.

Japanese video game company Nintendo, another Pokémon co-owner, suffered a massive breach in 2020, when hackers leaked game and console source code, along with internal documentation and development tools.

CybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Recently-patched Firefox bug exploited against Tor browser users

Next Post

Sweden, Finland partner to take down Sipulitie criminal marketplace

Related Posts

CISO’s Expert Guide To CTEM And Why It Matters

Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains why Continuous Threat Exposure Management (CTEM) is the smart approach for proactive cybersecurity. This concise report makes a clear business case for why CTEM’s comprehensive approach is the best overall strategy for shoring up a business’s cyber defenses in the face of evolving attacks. It also
Avatar
Read More

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data," a spokesperson for
Avatar
Read More

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to command-and-control (C2) infrastructure and stay under the radar. "ESXi appliances, which are unmonitored, are increasingly exploited as a persistence mechanism and gateway to access corporate networks widely," Sygnia
Avatar
Read More