Gaming Service Goes Down After Hacker Wipes Database and Holds It for Ransom (Rainbow six siege)

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
R6DB, an online service that provides statistics for Rainbow Six Siege players, went down over the weekend after an attacker wiped the company's database and asked a ransom.

The attack took down the service Saturday, September 30. In a statement released on Sunday, the company said an automated bot accessed their server, wiped the database, and left a ransom note behind. The database appears to be a PostgreSQL instance.

Company left server exposed online
The attacker's bot was able to access the database because the company's engineers left remote connections enabled for the database server from the development phase.

"Due to the hectical and unplanned September migration, we didn’t have everything locked down yet, which led to this situation," an R6DB spokesperson said. "They left a nice ransom message, but we have no reason to believe that they kept any data. On top of that our backups are useless, since they didn’t work on the Postgres codebase yet."

R6DB said the attacker only accessed the database, but they decided to wipe and reinstall the entire machine, just to be safe.

Some data is lost for good

Company engineers are working to restore as much of the data as possible, but R6DB expects some information to be lost for good.


Staff says they never stored any personal data on Rainbow Six Siege players, so service users don't have anything to worry about.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top