The ransomware attack that took place on the servers of Japanese gaming giant Capcom on November 2nd, 2020 is reported to have leaked nearly 350,000 customer information to hackers. The gaming giant that has a history of producing interesting online games such as Resident Evil, Monster Hunter, and Street Fighter has issued a press release yesterday divulging some interesting details about the customized ransomware attack.
Ragnar Locker hacker group is confirmed to be involved in the incident and Capcom has decided not to pay any ransom to the hackers to free up their database from encryption.
Names, addresses, signatures, passport data, sales reports, and some company’s finance related data are suspected to have been grabbed by the hackers during the incident.
Inquiries from Cybersecurity Insiders have revealed that out of the stolen 350,000 customer info, over 134,000 is said to have belonged to customers from Japan who contacted the help desk for some gaming issue in recent months.
Furthermore, data such as Names, addresses, email IDs, photos, and birthdays belonging to over 14,000 North American Capcom store members, 4000 North American Esports operations website members, 40k shareholders, 28k former employees, over 125k job applicants, and 14k human resource records is believed to have been accessed by hackers.
As Capcom Games follows the practice of storing card details on a highly secured server, none of this information was accessed by hackers.
Note- Ragnar Locker Ransomware gang is known to steal information and lockdown the database from access until a ransom is paid. This file-encrypting malware is seen mainly targeting Microsoft Windows loaded PCs.