Late last week, officials from Uber confirmed that threat actors tied to the Lapsus$ extortion group were able to compromise an employee’s account and exploit it to gain additional permissions. With these elevated permissions, the attackers were able to take control of internal tools and exfiltrate vulnerability reports that were created by Uber’s bug bounty program, some of which were still unpatched. Fortunately, officials have revealed that the attackers did not access any sensitive employee or customer information, and all stored personal and payment information was encrypted.
Starbucks Singapore suffers customer data breach
Recently, customers belonging to the loyalty program for Starbucks Singapore received an email notifying them hackers had illicitly accessed stored customer data. Not long after, the hackers published the stolen data to their leak site and claimed to have over 500,000 available records. Though Starbucks does not store any payment card data, their password database may have been affected,and are urging customers to update their login credentials.
Hacker posts footage from unreleased Rockstar videogame
Over the weekend, a threat actor from the Lapsus$ extortion group posted 50 minutes of stolen video footage from the upcoming Grand Theft Auto 6 game published by Rockstar Games. Alongside the footage, the hacker also claimed to have source code from GTA 5 in hopes of making a deal with Rockstar for the return of their intellectual property. The breach into Rockstar’s internal network appears to have originated from an employee opening a malicious email, which enabled the hacker to download the videos from a company Slack channel.
Hive ransomware takes credit for NYRA attack
Actors behind the Hive ransomware group have posted a zip file to their leak site claiming to be from the June cyberattack on the New York Racing Association (NYRA). The file itself is free to download, which signifies a failed ending to any ransom negotiations with the victim. Unfortunately, the data stolen during the June attack included a significant number of employees and client information. The main website for the NYRA is still inaccessible and might still be impacted by the incident.
2K Games helpdesk used to distribute malicious emails
Officials for the video game publisher, 2K Games, are urging users to not click on any emails received from their Helpdesk, which has been hijacked. It is unclear who was responsible for the attack, but threat actors were able to distribute malicious emails to any users who had previously contacted 2K support. The company has also recommended that anyone who opened the email to update all login credentials that are stored in the browser.