Capcom

Japanese game giant Capcom has announced a data breach after confirming that attackers stole sensitive customer and employee information during a recent ransomware attack.

If you grew up going to arcades or playing video games, then Capcom is instantly recognizable as the developer of well-known game franchises, including Street Fighter, Resident Evil, Ghosts and Goblins, Devil May Cry, and Mega Man.

On November 2nd, 2020, Capcom was hit with a cyberattack that led to them shutting down portions of their network to halt the infection's spread.

Capcom outage message on their website
Capcom outage message on their website

It was soon learned that the Ragnar Locker ransomware operation caused Capcom's cyberattack after a security researcher found a sample of the malware used in their attack.

While almost all human-operated ransomware operations steal unencrypted files before encrypted devices as a double-extortion strategy, Capcom stated there was no indication that any data was stolen.

"Further, it stated that at present there is no indication that any customer information was breached," Capcom stated in a November 4th press release.

However, their statement contradicted stolen data samples seen by BleepingComputer and published by Ragnar Locker on their website and ransom note.

Stolen Capcom Steam sales report
Stolen Capcom Steam sales report

Capcom discloses data breach

In a data breach notification released today, Capcom has admitted that not only has confidential corporate documents been stolen, but that the threat actors stole customers' and employees' data as well.

During the attack, the hackers gained access to customers' names, addresses, gender, phone numbers, email addresses, birth dates, investor names, and amount of shareholdings, and photos.

For employees, the information exposed could include names, addresses, passport information, signatures, birth dates, phone numbers, photos, email addresses, and more.

The full list of stolen information is below:

1. Information verified to have been compromised

i. Personal information: 9 items

  • Personal information of former employees: 5 items
    (Name & signature: 2 items; name & address: 1 item; passport information: 2 items)
  • Personal information of employees: 4 items
    (Name and HR information: 3 items; name & signature: 1 item)

ii. Other information

  • Sales reports
  • Financial information

2. Potentially compromised data

i. Personal information (customers, business partners, etc.): maximum of approx. 350,000 items

  • Japan: Customer service video game support help desk information (approx.134,000 items)
    Names, addresses, phone numbers, email addresses
  • North America: Capcom Store member information (approx. 14,000 items)
    Names, birthdates, email addresses
  • North America: Esports operations website members (approx. 4,000 items)
    Names, email addresses, gender information
  • List of shareholders (approx. 40,000 items)
    Names, addresses, shareholder numbers, amount of shareholdings
  • Former employees' (including family) information (approx. 28,000 people);
    applicants' information (approx. 125,000 people)
    Names, birthdates, addresses, phone numbers, email addresses, photos, etc.

ii. Personal information (employees and related parties)

  • Human resources information (approx. 14,000 people)

iii. Confidential corporate information

  • Sales data, business partner information, sales documents, development documents, etc.

Capcom states that no credit card information or payment transactions were accessed as they are processed by a third-party service provider.

What should Capcom users do?

It does not appear that account logins and passwords were accessed during this attack, but there was enough sensitive information exposed that affected people should be concerned.

In particular, threat actors could use this information in targeted phishing attacks that attempt to steal further sensitive information from employees and customers.

Therefore, if you receive an email stating it's from Capcom asking you for sensitive information, be suspicious of it and confirm that it is valid first.

To be safe, BleepingComputer also suggests that you change your Capcom password and make sure it is not used at any other site. While it does not appear that the attackers gained access to user databases, changing your password is an easy task that can save you a lot of headaches in the future.

Related Articles:

Marine services provider Swire Pacific Offshore hit by ransomware

UK Labour Party discloses data breach after ransomware attack

Italian celebs' data exposed in ransomware attack on SIAE

Accenture confirms data breach after August ransomware attack

Australia to tackle ransomware data breaches by deleting stolen files