Data Breach

Alleged Grand Theft Auto 6 (GTA6) gameplay videos and source code leaked online

Threat actors leaked source code and gameplay videos of Grand Theft Auto 6 (GTA6) after they have allegedly breached Rockstar Game.

Threat actors allegedly compromised Rockstar Game’s Slack server and Confluence wiki and leaked Grand Theft Auto 6 gameplay videos and source code.

On September 18, 2022, threat actors that go on GTAForums as ‘teapotuberhacker’ shared on GTAForums a link to a RAR archive containing tens of gameplay videos. teapotuberhacker did not share details of the alleged hack. The videos were recorded by the development team while testing some features of the latest chapter of the popular game.

“More convincing is the footage showing a poolside conversation between a male player-character and a couple of redneck associates (Twitter(opens in new tab)). Dialogue like, “Oh yeah, he’s dead, is he? Just like there’s a country called Finland,” comes off as extremely Rockstar, and the voice-acting quality checks out.” reported PCGamer, which published the news of the leak.

As proof of the hack, the threat actors also shared screenshots of source code from both Grand Theft Auto V and Grand Theft Auto 6.

The leaked videos are flooding social media platforms such as Twitter and Telegram despite copyright claims by Take 2 Interactive, the owner of Rockstar Games.

According to BleepingComputer, the threat actors claim to have stolen the source code, assets and testing build of GTA5 and GTA6. The attackers are threatening the Rockstar Games to prevent further data leak and at this time are offering for sale only GTA 5 data.

Bloomberg reporter Jason Schreier, who cited sources at Rockstar, confirmed the authenticity of the leak.

teapotuberhacker also claims to have hacked Uber, but has yet to share any proof of the attack.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, GTA6)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

1 hour ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

9 hours ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

17 hours ago

Law enforcement dismantled the infrastructure behind Lumma Stealer MaaS

Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…

22 hours ago

Russia-linked APT28 targets western logistics entities and technology firms

CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…

1 day ago

A cyberattack was responsible for the week-long outage affecting Cellcom wireless network

Cellcom, a regional wireless carrier based in Wisconsin (US), announced that a cyberattack is the…

1 day ago