Witcher 3 dev forums hacked, 1.8 million accounts stolen
Usernames, passwords and email addresses stolen from the CD Projekt RED forum
Polish game development studio CD Projekt RED has had more than 1.8 million user credentials stolen from its online forum, according to data breach notification website 'Have I Been Pwned?'.
The studio, which is famous for developing the highly successful Witcher franchise, was breached in March 2016 when hackers targeted its online forum, leading to a leak of usernames, passwords and email addresses.
Those signed up to notifications through Have I Been Pwned? were alerted to the breach by email this morning, with users recommended to change their passwords "immediately".
"Whilst the breach occurred in March 2016, sometimes there can be a lengthy lead time of months or even years before the data is disclosed publicly," the message stated, in an email seen by IT Pro. "Have I Been Pwned? will always attempt to alert you ASAP, it's just a question of how readily available the data is."
According to the site's creator, security researcher Troy Hunt, a total of 8,110 individual subscribers received breach alerts, considered a high rate for notifications.
The forum, which is hosted on CD Projekt RED's main website, acts as a news and discussions hub, providing users with gameplay advice and technical support.
The sheer number of affected accounts represents one of the most significant data breaches to have affected a gaming community. Hackers also targeted development studio Epic Games in August 2016, when 800,000 account details were stolen from its gaming forums, although that number is now dwarfed by the latest breach.
E-sports organiser ESEA, which coordinates events for the massively popular Counter Strike, also suffered from a botched ransomware attack in December, which ultimately led to 1.5 million accounts being leaked online as a result.
IT Pro has approached CD Projekt RED for comment but did not receive a reply in time for publication. We will update this story when we hear more.
Main image credit: Thomas McMullan
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now