- Hackers from group Rhysida stole data from Insomniac Games, including employee info and assets for upcoming games
- Rhysida demanded at least 50 BTC (over $2 million) in ransom or they would auction off the stolen data
- Attack compromised personal data on Insomniac employees and early content from upcoming Wolverine game
In October 2022, Sony-owned game studio Insomniac Games suffered a cyberattack by the hacking group Rhysida. The hackers reportedly gained access to confidential employee data and assets for upcoming titles. Now the hackers are auctioning off the stolen data and demanding ransom starting at 50 BTC, worth over $2 million.
Rhysida hackers claimed to have obtained passport scans, tax forms, and personal data on current and former Insomniac employees. Game assets were also compromised, including screenshots from the studio’s upcoming Wolverine title. Sony said it is investigating the attack but does not believe other divisions were impacted.
The Ransom Demand
Rhysida gave Insomniac Games one week to respond to demands before auctioning off data to the highest bidder at a 50 BTC starting price. The hackers claimed this was a “unique opportunity” to obtain “exclusive data” and said the buyer would be the “only owner.”
Previous Rhysida Hacks
The Rhysida group has been tied to other high-profile cyberattacks this year, including breaches at the British Library and a hospital in the UK. The scale of stolen data from the Insomniac attack is still unknown.
Impact on Upcoming Titles
The stolen assets provide an early look at Insomniac’s Wolverine game, expected for release in 2023. In 2022, another Sony studio Rockstar Games suffered major game leaks of Grand Theft Auto 6 content. Insomniac has not yet commented on the attack.
This breach shows the ongoing threat of cyberattacks facing major game studios, jeopardizing confidential employee data and early game content. Sony continues to investigate the attack, which may have compromised personal info on a large number of current and former Insomniac employees.