HelloKitty ransomware gang behind CD Projekt hack
Emsisoft CTO tells IT Pro that the sensitive data obtained by the attackers 'will most likely be leaked'
The cyber attack on Cyberpunk 2077 developer CD Projekt was likely orchestrated by the same ransomware gang responsible for targeting Brazillian energy company CEMIG late last year.
That's according to Emsisoft CTO Fabian Wosar, who shared his findings regarding this week's attack on Twitter.
The ransomware gang responsible for the incident is known to security researchers as 'HelloKitty', named after the mutex deployed when the malware executable is launched, as explained by BleepingComputer.
Wosar came to the conclusion after comparing the ransom notes left on both occasions and finding convincing similarities. He also debunked the possibility that the attack on CD Projekt was orchestrated by a former employee or a customer left unsatisfied by the developer’s latest release, Cyberpunk 2077. Following its launch in December 2020, the game had garnered headlines due to being plagued with bugs.
“This has nothing to do with disgruntled gamers and is just your average ransomware,” he said on Twitter. “I can see the appeal of the 'this was revenge by a former fan', but life is much more boring than that.”
In a statement confirming the attack, CD Projekt made it clear that they were not intending to give in to the hackers' demands nor pay the ransom.
Asked about the likely consequences of this decision, Wosar told IT Pro that the data obtained by HelloKitty, which includes documents containing accounting, administration, legal, HR, and investor relations information, “will most likely be leaked”.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Speculating about the identity of the hackers, Wosar said that he “wouldn't be surprised if the group or the affiliate who pulled off the hack grew up with western culture”.
“They certainly have a better command of the English language than your average ransomware thug. The ransomware is also missing the usual check for CIS countries,” he added.
According to Wosar, HelloKitty has been active since November 2020. In December, the group targeted Brazillian electric power provider CEMIG in an attempt to obtain a large amount of the company’s data. The company stated that the ransomware attack “caused limited damage” but managed to impact the company’s online service to its customers.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Microsoft unveils Maia 200 accelerator, claiming better performance per dollar than Amazon and GoogleNews The launch of Microsoft’s second-generation silicon solidifies its mission to scale AI workloads and directly control more of its infrastructure
-
Infosys expands Swiss footprint with new Zurich officeNews The firm has relocated its Swiss headquarters to support partners delivering AI-led digital transformation
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
