Investigation opened into a potential hack at Razer, the famous manufacturer of peripherals for gamers


Renowned gaming peripheral maker Razer is investigating a hack of its Razer Gold payment platform, after a hacker claimed to have stolen source codes, encryption keys and credentials.

The company is conducting a “thorough review” of all of its websites and has taken “all necessary steps” to secure its platforms, a spokesperson told ZDNET.com on Tuesday. “Razer is still in the midst of an investigation. Once the investigation is complete, Razer plans to report this matter to the appropriate authorities.”

Alerted on Sunday

Based in Singapore and California, the company said it was alerted on Sunday to a potential Razer Gold hack. This payment platform allows you to buy games and features in more than 42,000 titles. Razer’s spokesperson did not respond directly to ZDNET.com’s list of questions, including the number of customers possibly affected, their locations and the hackers’ allegations.

On Saturday, an announcement posted on a hacker forum claimed the theft of a wealth of data, including source codes, encryption keys, access credentials and a database for “Razer.com and its products”. . The author of the announcement posted screenshots of the alleged hack, listing folders that appear to contain, among other things, API and billing details. The cybercriminal is looking to get rid of all of this data for $100,000 in Monero cryptocurrency, although he says he is willing to negotiate a sale for a lower amount.

bitbucket

According to DataBreaches.net, which was one of the first to break the news on Saturday, the hacker had yet to receive an offer on Monday. The media had communicated with the cybercriminal through a Jabber account. DataBreaches.net said it was unable to verify the authenticity of this account, but deemed it “likely” that the person was the hacker. The malicious hacker added that he had not contacted Razer and had no intention of extorting the company. Asked how he did it, he said he stole access and obtained credentials from the software development management service Bitbucket, before later cloning the repository.

In such cases of stolen data, hackers operate like “criminals selling stolen jewelry,” said Satnam Narang, senior research engineer at Tenable. “These cybercriminals are looking for the best possible deal, but they are willing to compromise on price and focus on speed. Because even if the stolen data is valuable, stealing it means law enforcement action. “, Mr. Narang said in a note commenting on the alleged Razer hack.

Source code protection

Phillip Ivancic, Asia-Pacific solutions strategy manager for Synopsys’ Software Integrity Group, noted that the piracy could involve source code, an important but “often overlooked” area of ​​concern. Besides their commercial value as intellectual property, source codes can be analyzed offline to plan further attacks, Ivancic said.

Access to the source code allows cybercriminals to gain in-depth knowledge of the vulnerabilities that may exist. So much interesting information to launch new attacks. This expert thus urged organizations to pay particular attention to their software development environments.

Razer previously suffered a data breach in 2020 when an employee of its IT provider Capgemini inadvertently disabled security settings. Last December, the High Court of Singapore awarded Razer 6.5 million dollars (about 5.9 million euros) in damages. The French IT consultancy giant appealed, arguing that Razer had failed in damage control due to its own shortcomings.



Source link -97