Hackers Stole Source Code, Wealth of Internal Tools from Gaming Giant Electronics Arts
Wray says cyber threats are increasing exponentially, Schumer starts a wide cybersecurity legislation review, Google fixes zero-day in Chrome, Security company COO indicted for a cyberattack, more
Stay on top of cybersecurity developments throughout the day by following Metacurity on Twitter.
Hackers stole a wealth of source code and related internal tools after breaking into gaming giant Electronic Arts, the publisher of Battlefield, FIFA, and The Sims. Among the properties stolen in the 780 GB theft are the source code for FIFA 21, as well as code for its matchmaking server, along with tools for the Frostbite engine, which powers many EA games, proprietary EA frameworks, and software development kits (SDKs).
The hackers are ostensibly trying to sell the information. EA said that"No player data was accessed, and we have no reason to believe there is any risk to player privacy.” (Joseph Cox / Motherboard)
Related: Techradar, WinBeta, DataBreaches.net, BBC News, Bleeping Computer, Slashdot, Engadget, Marketwatch, WIRED, WSJ.com: WSJD, Bloomberg News, Daily Maverick, channelnews, CTVNews.ca, HotHardware.com, RT USA, Neowin, The New Daily, Reddit-hacking, CNN, ABC.net.au, Japan Today, Tech Xplore, Cyber Kendra, TechSpot, Gizmodo, SlashGear » security, UPI.com, TechRaptor, IGN All, Security News | Tech Times, MobileSyrup.com, IGN All, New York Times, Techradar, Ubergizmo, Kotaku, WinBeta, CNET News, WinBeta, USA Today, Engadget, Deutsche Welle, Ars Technica, New York Times - Business, DataBreaches.net, Slashdot, Techradar, Solutions Review
Jen Easterly, nominated by President Biden to lead the Cybersecurity and Infrastructure Security Agency, and Chris Inglis, the former National Security Agency deputy director named by Biden to fill the new national cyber director role, faced the Senate during confirmation hearings.
During the hearing, both top cybersecurity nominees agreed that the current voluntary cybersecurity standards and breach notifications for critical infrastructure providers are not working and signaled they would support changes. (Justin Katz / FCW)
Speaking during a House Judiciary Committee hearing, FBI Director Christopher Wray told members that the “cyber threat is increasing almost exponentially” given the rapid-fire of recent high-profile ransomware and supply chain hacking incidents.
Wray also discouraged companies from paying ransom to their attackers, saying the most important part" in preventing ransomware attacks is to "communicate and coordinate with law enforcement right out of the gate.” (Erin Doherty / Axios)
Senate Majority Leader Chuck Schumer said he is initiating a review of recent high-profile cyber-attacks on governments and businesses to determine whether a legislative response is needed.
Schumer has asked Chairman Gary Peters (D-MI) of the Homeland Security Committee and other relevant committee chairs to begin a government-wide review of these attacks to determine what legislation is needed. (Richard Cowan / Reuters)
Polish video game developer CD Projekt warned that internal data stolen during its February ransomware attack, during which threat actors stole source code and business data, is circulating on the Internet.
CD Projekt said that the stolen data may have been manipulated and may include current/former employee and contractor details in addition to data related to our games. (Lawrence Abrams / Bleeping Computer)
Google released an update for its Chrome browser to fix a zero-day vulnerability the company’s security team said was part of the arsenal of a “commercial exploit company.”
The vulnerability, CVE-2021-30551, was abused in the wild together with a Windows zero-day, CVE-2021-33742, which Microsoft patched earlier this week. The exploit broker provided the two zero-days to a nation-state, which used them for a small number of attacks against targets in Eastern Europe and the Middle East. (Catalin Cimpanu / The Record)
Related: Reddit - cybersecurity, Security Affairs, Naked Security, Security Affairs, Phandroid, Sensors Tech Forum, Security - Computing, PCMag.com, SecurityWeek, The Hacker News, US-CERT Current Activity
Vikas Singla, the Chief Operating Officer of a metro Atlanta network security company that served the healthcare industry, has been charged with conducting a cyberattack against Gwinnett Medical Center in 2018.
According to a federal indictment, Singla’s cyberattack involved disrupting phone service, obtaining information from a digitizing device, and disrupting network printer service. Singla has been charged with 17 counts of intentional damage to a protected computer and one count of obtaining information from a protected computer. (Justice Department)
New figures from the European Union Agency for Cybersecurity show that significant cyberattacks against critical targets in Europe have doubled in the past year, with hospitals hit harder than ever before.
ENISA said that 304 significant, malicious attacks against "critical sectors" occurred in 2020, more than double the 146 recorded the year before, with a 47% rise in attacks on hospitals and health care networks. (Nick Paton Walsh / CNN)
Pan-Arab news network Al Jazeera said that it has been subject to a succession of cyberattacks between June 5 and June 8 but that its service provider had successfully defended Qatar's flagship broadcaster.
The peak of the attacks came ahead of a documentary described detailing indirect negotiations between Israel and Palestinian militant group Hamas, which included a voice recording purportedly of an Israeli-held prisoner in Gaza. (Reuters)
The Justice Department announced in a joint operation by law enforcement agencies from the US it had seized the servers and domains of SlilPP, a well-known online marketplace where criminal groups assembled to trade stolen login credentials.
The DOJ said that the SlilPP portal sold more than 80 million login credentials from more than 1,400 companies. (Catalin Cimpanu / The Record)
RSA Security has spun out its fraud and risk intelligence business into a standalone company called Outseer, focusing on payment security tools as fraudulent transactions soar.
Outseer will continue to operate under the RSA umbrella and will inherit from the company three core services, Outseer Fraud Manager (formerly RSA Adaptive Authentication), 3-D Secure (formerly Adaptive Authentication for eCommerce), and Fraud Action, which more than 6,000 financial institutions collectively use. (Carly Page / Tech Crunch)
A notorious gang of Eastern European cybercriminals with ties to the Russian government, once called the “Business Club,” now better known as Ryuk, has hit at least 235 general hospitals and inpatient psychiatric facilities, plus dozens of other healthcare facilities in the U.S. since 2018.
The group mostly targets large organizations and counts on its attacks to wreak havoc. Last September, a Ryuk attack on Universal Health Services Inc. cost the company $67 million, even though the company did not pay a ransom in the attack. (Kevin Poulsen and Melanie Evans / Wall Street Journal)