Skip to content

Rhysida Ransomware targets Sony Insomniac

Sony is investigating a security breach that has affected its game developer division, Insomniac Games. The breach resulted in unauthorized access and leakage of employee information, as well as details related to upcoming game designs and coding. The severity of the breach is still being determined, but the responsible criminal group, known as Rhysida, has released a screenshot of the upcoming Wolverine Game as proof. This is not the first time Sony Entertainment has been targeted, as a similar attack occurred in May of this year. In response to the cyber threat, the US Department of Justice and the Cybersecurity and Infrastructure department have issued an alert recommending the implementation of Multi-Factor Authentication and raising employee awareness about the current cyber threat landscape. The Rhysida Ransomware group has issued a 7-day ultimatum to Insomniac staff, threatening to release or sell all stolen data on the dark web if a ransom of BTC 50 is not paid. However, they have assured that upon successful payment recovery, all stolen data will be promptly deleted from their servers.

Key Points:
1. Sony’s game developer division, Insomniac Games, has experienced a security breach resulting in unauthorized access and leakage of employee information and game details.
2. The severity of the breach is still being determined, but the criminal group responsible, Rhysida, has released a screenshot of an upcoming game as proof.
3. This is not the first time Sony Entertainment has been targeted, with a similar attack occurring in May of this year.
4. The US Department of Justice and the Cybersecurity and Infrastructure department have issued an alert recommending the implementation of Multi-Factor Authentication and raising employee awareness about cyber threats.
5. The Rhysida Ransomware group has given Insomniac staff a 7-day ultimatum to pay a ransom or face the release or sale of stolen data on the dark web. However, they have promised to delete the data upon successful payment recovery.

Leave a Reply

Your email address will not be published. Required fields are marked *