Cyberpunk 2077 developer CD Projekt hit by ransomware attack

Hackers claim to have accessed unreleased Witcher 3 source code and threaten to leak it unless a payment is made

The cover of CD Projekt's Cyberpunk 2077 on a computer display

CD Projekt, the developer behind games such as Cyberpunk 2077 and The Witcher, has fallen victim to a cyber attack that saw hackers access its internal network and threaten to leak sensitive data. 

The Polish games company confirmed on Twitter that a portion of its internal systems had been compromised, with hackers obtaining company data as well as encrypting a number of developer devices.

In a ransom note shared by the company, the hackers claimed to have accessed source code for games including Cyberpunk 2077, Gwent, and an unreleased version of The Witcher 3, and threatened to leak it unless a payment was made.

They also managed to obtain documents containing accounting, administration, legal, HR, and investor relations information.

A CD Projekt spokesperson told IT Pro that they are not able to provide further information on the impact of the attack on future game development or the sum requested in the ransom. However, the company made it clear that they were not intending to give in to the hackers' demands. 

“We will not give in the demands nor negotiate with the actor, being aware that this may eventually lead to the release of the compromised data,” it said, noting that it is still investigating the attack and has “already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office", which is the Polish equivalent of the ICO.

Related Resource

Ransomware made MSPeasy

The MSP's guide to saving the day

The MSP's guide to ransomware - whitepaper from DattoDownload now

In the statement, CD Projekt added that it has secured its “IT infrastructure and begun restoring the data” from backups and that no customer data was impacted by the attack. 

ESET cybersecurity specialist Jake Moore said that it seems as if CD Projekt had “the correct protocol in place to withstand such demands and upheaval”.

“All good businesses have critical redundancies in place to mitigate the risk and this can only be truly simulated by testing the backups regularly and red teaming the company. We, unfortunately, live in a world where very little remains untouchable but the forward-thinking decision-makers understand this risk and spend money and time in reducing the impact,” he added.

The attack on CD Projekt comes after three other major gaming developers were targeted in the last few months. Ubisoft and Crytek were hit by the Egregor ransomware gang in October 2020, while Capcom fell victim to the Ragnar Locker group a month later.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

9 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021