Concerns Arise Over Potential Data Breach Affecting 530,000 Individuals in the Cloud PC Gaming Company, Shadow

    Shadow, a cloud-based PC gaming service, has confirmed a security breach involving the theft of customer data following a sophisticated social engineering attack on one of its employees.

    CEO Eric Sele declined to disclose the exact number of affected individuals, even as an individual claiming to have pilfered information on 533,624 customers offered the database for sale on a cybercrime forum.

    The breach is believed to have occurred as a result of a highly orchestrated and meticulously planned attack. It began on the Discord platform, where an unsuspecting employee encountered what appeared to be an innocuous game on Steam, proposed by someone posing as an acquaintance. This game, however, was a cleverly disguised vehicle for malware.

    Once the malware was downloaded, it quietly infiltrated the employee’s system, giving the attackers an entry point into Shadow’s infrastructure. The attackers then used a stolen cookie, which likely contained authentication information, to access the management interface of one of Shadow’s service providers.

    The attackers could exploit the system through this compromised interface, extracting sensitive customer data via the service provider’s API. This breach exposed a wide range of personal information, including full names, email addresses, dates of birth, billing addresses, and credit card expiration dates. Importantly, no passwords or sensitive banking information were compromised during the breach.

    Upon discovering the breach, Shadow took immediate measures to secure its systems, severing the attackers’ access, and initiating a thorough security audit. The company also strengthened its security protocols with its third-party providers to prevent such incidents from happening in the future.

    Sele expressed his deep regret for the inconvenience caused to customers and emphasized that transparency was a core principle at Shadow. The company is committed to addressing the issue and ensuring the security of its services going forward.

    In an email alert to Shadow customers, Sele provided more details about the attack’s timeline, revealing that it occurred in late September. The complex nature of the attack serves as a stark reminder of the evolving tactics cybercriminals use to infiltrate even well-protected systems.

    Latest articles

    Related articles