IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

HelloKitty ransomware gang behind CD Projekt hack

Emsisoft CTO tells IT Pro that the sensitive data obtained by the attackers 'will most likely be leaked'

The cyber attack on Cyberpunk 2077 developer CD Projekt was likely orchestrated by the same ransomware gang responsible for targeting Brazillian energy company CEMIG late last year.

That's according to Emsisoft CTO Fabian Wosar, who shared his findings regarding this week's attack on Twitter.

The ransomware gang responsible for the incident is known to security researchers as 'HelloKitty', named after the mutex deployed when the malware executable is launched, as explained by BleepingComputer.

Wosar came to the conclusion after comparing the ransom notes left on both occasions and finding convincing similarities. He also debunked the possibility that the attack on CD Projekt was orchestrated by a former employee or a customer left unsatisfied by the developer’s latest release, Cyberpunk 2077. Following its launch in December 2020, the game had garnered headlines due to being plagued with bugs.

“This has nothing to do with disgruntled gamers and is just your average ransomware,” he said on Twitter. “I can see the appeal of the 'this was revenge by a former fan', but life is much more boring than that.”

In a statement confirming the attack, CD Projekt made it clear that they were not intending to give in to the hackers' demands nor pay the ransom.

Asked about the likely consequences of this decision, Wosar told IT Pro that the data obtained by HelloKitty, which includes documents containing accounting, administration, legal, HR, and investor relations information, “will most likely be leaked”.

Speculating about the identity of the hackers, Wosar said that he “wouldn't be surprised if the group or the affiliate who pulled off the hack grew up with western culture”.

“They certainly have a better command of the English language than your average ransomware thug. The ransomware is also missing the usual check for CIS countries,” he added.

According to Wosar, HelloKitty has been active since November 2020. In December, the group targeted Brazillian electric power provider CEMIG in an attempt to obtain a large amount of the company’s data. The company stated that the ransomware attack “caused limited damage” but managed to impact the company’s online service to its customers. 

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
US and Israel join forces to fight ransomware
ransomware

US and Israel join forces to fight ransomware

15 Nov 2021

Most Popular

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
The UK's best cities for tech workers in 2022
Business strategy

The UK's best cities for tech workers in 2022

24 Jun 2022
Carnival hit with $5 million fine over cyber security violations
cyber security

Carnival hit with $5 million fine over cyber security violations

27 Jun 2022