Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Capcom Says Personal Data of Thousands More Stolen in Ransomware Attack

Video game giant Capcom this week revealed that thousands more people than initially believed had their personal information stolen in a ransomware attack in November 2020.

Video game giant Capcom this week revealed that thousands more people than initially believed had their personal information stolen in a ransomware attack in November 2020.

Known for video games such as Devil May Cry, Monster Hunter, Resident Evil, Street Fighter, Ace Attorney and Mega Man, the Japanese company has operations in Asia, Europe, and the United States.

On November 4, the game maker announced that it detected unauthorized access to its network, and two weeks later confirmed that the attackers accessed the personal information of employees, as well as financial information, sales reports, and other business data.

The operators of the Ragnar Locker ransomware, who claimed the attack, said in November they were able to download over 1TB of data from the company.

This week, Capcom announced that its investigation into the incident revealed that the number of people who had their personal information compromised in the ransomware attack is larger than initially believed.

Specifically, the company now says that a total of 16,415 people (including 3,248 business partners, 9,164 former employees and related parties, and 3,994 employees and related parties) had their personal information stolen. Initially, Capcom said only 9 people were impacted.

Affected information includes names, physical and email addresses, phone numbers, HR information, birthdates, passport information, and the like.

The “potential maximum number of customers, business partners and other external parties” that might have been affected by the incident is of approximately 390,000 people (up roughly 40,000 people from previous estimates), Capcom says.

Advertisement. Scroll to continue reading.

The company removed approximately 18,000 items of personal information from the list, as it has no evidence that the data might have been affected.

Game development documents, sales reports, financial information, and other information related to business partners was also accessed during the ransomware attack. The company also expects for new details to emerge as the investigation progresses.

“Further, because the overall number of potentially compromised data cannot specifically be ascertained due to issues including some logs having been lost as a result of the attack, Capcom has listed the maximum number of items it has determined to potentially have been affected at the present time,” the video game maker notes.

Just as before, the company underlined that no credit card information was compromised in the incident, as such information is not stored internally (online transactions are handled by a third-party service provider).

Capcom says that it was able to recover most of the affected internal systems and that business operations have returned to normal.

Related: Carnival Corp. Confirms Personal Information Compromised in Ransomware Incident

Related: Blackbaud Says Bank Account Data, SSNs Impacted in Ransomware Incident

Related: Capcom Confirms Hackers Stole Data in Recent Attack

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...