Capcom data breach adds another 40,000 estimated victims

CAPCOM logo on a smartphone screen

A ransomware attack launched against gaming company Capcom last November is much worse than originally reported.

In a statement, the company behind games such as Resident Evil, Street Fighter, and DarkStalkers said the attack potentially compromised up to 390,000 users’ data - 40,000 more than the company initially thought.

Capcom discovered the data breach, which the company said impacted personal and corporate data, in early November 2019.

Initially, the company confirmed the data leak affected only nine people and estimated the total impact to be 350,000 people. In a new update, Capcom said the company has verified that the breach compromised an additional 16,406 users' personal information, bringing the number of confirmed users impacted to 16,415.

The company said its investigations were ongoing, and it's “possible that new facts may come to light going forward.”


Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation


“Capcom offers its sincerest apologies for any complications and concerns that this may bring to its potentially impacted customers as well as to its many stakeholders,” the statement said.

Capcom added that none of the at-risk data contains credit card information. “All online transactions etc. are handled by a third-party service provider, and as such Capcom does not maintain any such information internally,” read the statement.

The company also said the areas this attack impacted are unrelated to systems used when connecting to the internet to play or purchase the company's games online. These have continued to use an external third-party server or an external server.

“As such, these systems have been unaffected by this ransomware attack and it is safe for Capcom customers or others to connect to the internet to play or purchase the company's games online,” the company said.

Niamh Muldoon, global data protection officer at OneLogin, told IT Pro that ransomware is the one activity that has a high direct return on investment out of all the cyber crime activities.

“Taking the global economic environment and current market conditions into consideration cybercriminals will, of course, continue to focus on their efforts to this revenue-generating stream. Remember that your employees are your most valuable assets both from a security threat awareness perspective but to provide valuable insights into the pulse and culture of the organization so it's important to keep a close eye on the ground,” Muldoon said.

“The key message here is no one, industry or company, is exempt from the ransomware threat and it requires constant focus, assessment, and review to ensure you and your critical information assets remain safeguarded and protected against it."

Rene Millman

Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.