{"id":38701,"date":"2021-02-09T11:48:52","date_gmt":"2021-02-09T16:48:52","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38701"},"modified":"2022-05-05T04:38:04","modified_gmt":"2022-05-05T08:38:04","slug":"cd-projekt-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cd-projekt-ransomware-attack\/38701\/","title":{"rendered":"Cyberpunk 2021: CD Projekt attacked by ransomware gang"},"content":{"rendered":"<p>CD Projekt has <a href=\"https:\/\/twitter.com\/CDPROJEKTRED\/status\/1359048125403590660\" target=\"_blank\" rel=\"nofollow noopener\">issued a statement<\/a>, saying that unspecified ransomware attacked the company\u2019s information systems. The company, known for game series <em>The Witcher<\/em> and the notorious <em>Cyberpunk 2077<\/em> project and behind digital distribution service GOG.com, says that to its knowledge users\u2019 personal data wasn\u2019t affected by the attack.<\/p>\n<h2>What happened?<\/h2>\n<p>According to the statement, unknown hackers penetrated internal company systems, downloaded a significant amount of data, encrypted all information, and left a ransom note. In the note, they threatened CD Projekt with the publication of the data they\u2019d acquired. This modus operandi corresponds with ransomware tactics <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware-incidents-2020\/37589\/\" target=\"_blank\" rel=\"noopener nofollow\">common over the past few years<\/a>, not only encrypting data, but also threatening to leak it.<\/p>\n<p>The incident might be just another fast-disappearing news item about a ransomware attack if not for the company\u2019s reaction to the attack. CD Projekt says it does not plan to give in to any demands, or even to negotiate with the ransomware operators. Instead, the company plans to focus on mitigation, in particular by working with potentially affected third parties. In addition, CD Projekt published the ransom note.<\/p>\n<p>We support the decision not to pay, as well as such transparency in communications about the incident. Any payment to extortionists makes their ransomware business more profitable and supports the development of more and better malicious tools \u2014 but does not guarantee the criminals won\u2019t publish the stolen data anyway. (CD Projekt had backups of all critical information, so recovering the data was never an issue in this case.)<\/p>\n<h2>What was stolen?<\/h2>\n<p>The ransom note\u2019s list of compromised data is suspect \u2014 criminals are not necessarily trustworthy reporters \u2014 but it\u2019s the only information the public has about what was stolen. CD Projekt neither confirmed nor denied its accuracy. The criminals claimed they stole information from the Perforce version control server, including the full source code of several games:<\/p>\n<ul>\n<li><em>Cyberpunk 2077<\/em>,<\/li>\n<li><em>Witcher 3<\/em>,<\/li>\n<li><em>Gwent<\/em>,<\/li>\n<li>An unpublished version of <em>Witcher 3<\/em>.<\/li>\n<\/ul>\n<p>Moreover, the hackers claimed to have documents from the accounting, administration, legal, human resources, and investor relations departments, and they threatened to send the information to gaming journalists to destroy the developers\u2019 reputations.<\/p>\n<h2>Possible consequences<\/h2>\n<p>CD Projekt is already working with law enforcement agencies and cybersecurity specialists and plans to investigate the incident thoroughly. Without information about the contents of the stolen documents, predicting the results of the leak would be difficult, but overall, the company\u2019s incident response tactics should soften its potential reputational damages.<\/p>\n<p>As for the potential source code leak, it may spur cybercriminal groups to begin analyzing the company\u2019s products, searching for vulnerabilities. If they succeed, that could pose a danger to users, especially those using online multiplayer games.<\/p>\n<p>That\u2019s why we always recommend particular caution in development environments, which should be isolated from general corporate networks and protected with robust <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">security solutions<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>CD Projekt confirms attack on internal systems. Hackers claim to have downloaded Cyberpunk 2077 and The Witcher 3 source code, and demand ransom.<\/p>\n","protected":false},"author":2706,"featured_media":38702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,2683],"tags":[4004,647,961,420,81],"class_list":{"0":"post-38701","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-threats","10":"tag-cyberpunk-2077","11":"tag-gamers","12":"tag-leaks","13":"tag-ransomware","14":"tag-targeted-attacks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cd-projekt-ransomware-attack\/38701\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cd-projekt-ransomware-attack\/22510\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cd-projekt-ransomware-attack\/18000\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cd-projekt-ransomware-attack\/24225\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cd-projekt-ransomware-attack\/22292\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cd-projekt-ransomware-attack\/21032\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cd-projekt-ransomware-attack\/24703\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cd-projekt-ransomware-attack\/23926\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cd-projekt-ransomware-attack\/30097\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cd-projekt-ransomware-attack\/9320\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cd-projekt-ransomware-attack\/16396\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cd-projekt-ransomware-attack\/16963\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cd-projekt-ransomware-attack\/14479\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cd-projekt-ransomware-attack\/26228\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cd-projekt-ransomware-attack\/30019\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/cd-projekt-ransomware-attack\/26694\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cd-projekt-ransomware-attack\/23551\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cd-projekt-ransomware-attack\/28889\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cd-projekt-ransomware-attack\/28696\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38701"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38701\/revisions"}],"predecessor-version":[{"id":38705,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38701\/revisions\/38705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38702"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}