Japanese gaming giant Capcom has disclosed a data breach which led to unauthorized access of some files and systems. The developer claimed that the incident  impacted email and file servers, among other systems.

In a press release, the company explained that beginning in the early morning hours of November 2, 2020, some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers.

The company then confirmed that this was due to unauthorized access carried out by a third party, and that it has halted some operations of its internal networks as of November 2. Capcom also expressed its "deepest regret for any inconvenience this may cause to its various stakeholders," and that  at present there is no indication that any customer information was breached.

The incident, says the company, has not affected connections for playing the company's games online or access to its various websites. Presently, Capcom is consulting with the police as well as other related authorities while both carrying out an investigation and taking measures to restore its systems. The company will continue to offer relevant updates as the facts become clear, via its websites and other means.

Ms. Jamie Hart, Cyber Threat Intelligence Analyst at Digital Shadows, a San Francisco, Calif.-based provider of digital risk protection solutions, says, “According to reports, ransomware operators leveraging the Ragnar Locker ransomware variant are responsible for the attack; however, Capcom has not directly confirmed this. This attack is not the first time we've observed threat actors targeting video game development organizations. Threat actors may target companies within the video game industry due to the potential for a high payout.  For example, Egregor ransomware operators targeted game developers Ubisoft and Crytek in October 2020. Additionally, Sodinokibi (REvil) ransomware operators have reportedly promised an attack targeting a very large video game developer in the future.”

Mark Kedgley, CTO at New Net Technologies (NNT), a Naples, Florida-based provider of IT security and compliance software, notes, “This is bad news for one of the world's most favorite companies and once again demonstrates that cybersecurity is less about being a ‘Street Fighter’, and much more about being a master tactician. Cybersecurity needs discipline and strategy, as well as full range of 'Super Combo' moves, including vulnerability management, system hardening and change control. Mastering all of these is essential in order to counteract the 'End of Level Bosses' of the hacker world, including today’s ever-present ransomware threat.”