CAPCOM RANSOMWARE ATTACK

Capcom is a well known Japanese game company. In Japanese media, the company reported that several of their servers were attacked by Ransomware called itself Ragnar Locker. Capcom shutdown their systems to prevent further penetration. It seems that is the most common defensive move as attacks have been shown to be very damaging.

Capcom said it fell victim to “tailor-made ransomware aimed specifically at the company to maliciously encrypt the information saved on its servers and delete its access logs.” Clearly this appears to be a sophisticated attack using advanced techniques to get past security.

Ransomware is not as common as Windows 10 has been hardened to block its action. Linux is widely used for internet infrastructure which has been attacked frequently as well.

Capcom said it has “verified that some personal information has been compromised,” adding that the ransomware outbreak “destroyed and encrypted data on its servers.” Together with the confirmed leaks of data, Capcom has also provided a list of potentially exposed records, choosing to list them as worst-case scenarios:

  • The PII of customers, business partners, and more: 350,000 items
  • Japan’s customer service video game support, help desk: 134,000 items, including names, addresses, phone numbers, email addresses
  • North America: Capcom Store member information: 14,000 items, including names, dates of birth, email addresses
  • Esports operations website members: 4,000 items, including names, email addresses, gender
  • Shareholder lists: 40,000 items, including names, addresses, shareholder numbers, amounts
  • Former employees and family: 28,000 people, applicant data (125,000 people): names, dates of birth, addresses, phone numbers, and more
  • Human resources data: 14,000 people
  • Confidential corporate information: business partner records, sales documents, and more

Capcom is keen to emphasize that no credit card data has been included in the breach, as payments are managed by a third-party.