Massive Rainbow Six Siege breach gives players billions of credits
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要以“文章内容总结”或者“这篇文章”这样的开头。直接写文章描述即可。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是育碧的游戏《彩虹六号:围攻》遭遇了黑客攻击。黑客利用内部系统漏洞,可以封禁或解封玩家,篡改游戏中的审核信息流,还能给全球玩家账号发放大量游戏内货币和 cosmetic 项目。 接着,文章提到育碧官方确认了这一事件,并采取了关闭游戏和市场措施。他们还提到不会惩罚玩家使用这些被赠送的货币,但会回滚部分交易。此外,有传言说育碧的基础设施遭受了更大的入侵,可能涉及MongoBleed漏洞。 现在我要把这些信息浓缩到100字以内。首先说明事件:育碧《彩虹六号:围攻》遭黑客攻击。然后说明黑客做了什么:滥用内部系统封禁/解封玩家、篡改审核信息、发放大量游戏货币和道具。接着说明育碧的应对措施:关闭游戏和市场,并回滚部分交易。最后提到有传言称存在更大的入侵事件。 这样组合起来应该可以控制在100字以内,并且直接描述内容,不使用任何开头语。 </think> 育碧《彩虹六号:围攻》遭遇黑客攻击,允许攻击者滥用内部系统封禁/解封玩家、篡改游戏审核信息流并发放大量游戏内货币及道具。育碧已确认事件并关闭游戏及市场以解决问题,同时回滚部分交易。有传言称存在更大规模的入侵事件。 2025-12-28 05:46:35 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

Rainbow Six Siege

Ubisoft's Rainbow Six Siege (R6) suffered a breach that allowed hackers to abuse internal systems to ban and unban players, manipulate in-game moderation feeds, and grant massive amounts of in-game currency and cosmetic items to accounts worldwide.

According to multiple player reports and in-game screenshots shared online, the attackers were able to:

  • Ban/unban Rainbow Six Siege players
  • Display fake ban messages on the ban ticker.
  • Grant all players approximately 2 billion R6 Credits and Renown
  • Unlock every cosmetic item in the game, including developer-only skins

R6 Credits are a premium in-game currency sold for real money on Ubisoft's store. Based on Ubisoft's pricing, 15,000 R6 Credits cost $99.99, placing the value of 2 billion credits at roughly $13.33 million worth of in-game currency distributed for free.

Wiz

At 9:10 AM on Saturday, the official Rainbow Six Siege account on X confirmed the incident, stating that Ubisoft was aware of an issue affecting the game and that teams were working to resolve it.

Shortly afterward, Ubisoft intentionally shut down Rainbow Six Siege and its in-game Marketplace, stating they were still working on the issue.

"Siege and the Marketplace have been intentionally shut down while the team focuses on resolving the issue," reads a post on X.

In a final update, Ubisoft clarified that players would not be punished for spending the granted credits, but that it would be rolling back all transactions made since 11:00 AM UTC.

The company also stated that Ubisoft did not generate the messages seen in the ban ticker and that the ticker had been disabled previously.

Fake ban messages on the Rainbow Six Siege ban ticker
Fake ban messages on the Rainbow Six Siege ban ticker
Source: @ViTo_DEE91

Ubisoft said it was continuing to work toward fully restoring the game, but the servers remain down at this time.

At this time, Ubisoft has not released a formal statement regarding the incident and has not responded to emails from BleepingComputer requesting details on how the breach occurred.

If you have any information regarding this incident or any other undisclosed attacks, you can contact us confidentially via Signal at 646-961-3731 or at [email protected].

Rumors of a larger breach

Unverified claims state that a much larger breach occurred within Ubisoft's infrastructure.

According to security research group VX-Underground, threat actors claimed to have breached Ubisoft's servers using a recently disclosed MongoDB vulnerability dubbed "MongoBleed."

Tracked as CVE-2025-14847, the flaw allows unauthenticated remote attackers to leak the memory of exposed MongoDB instances, exposing credentials and authentication keys. A public PoC exploit has already been released that searches for secrets in exposed MongoDB servers.

VX-Underground reports that multiple unrelated threat groups may have targeted Ubisoft:

  • One group claims to have exploited a Rainbow Six Siege service to manipulate bans and in-game inventory without accessing user data.
  • A second group allegedly exploited a MongoDB instance using MongoBleed to pivot into Ubisoft's internal Git repositories, claiming to steal a large archive of internal source code from the 1990s to the present.
  • A third group claims to have stolen Ubisoft user data via MongoBleed and is attempting to extort the company into paying a ransom.
  • A fourth group disputes some of these claims, stating that the second group had access to Ubisoft's source code for a while.

BleepingComputer has not been able to independently verify any of these claims, including whether MongoBleed was exploited, whether internal source code was accessed, or whether customer data was stolen.

At this time, we only know that Ubisoft has confirmed the in-game abuse in Rainbow Six Siege, and there is no public evidence of a larger breach.

BleepingComputer will update this story if Ubisoft provides additional details or if we learn more about these other claims.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/massive-rainbow-six-siege-breach-gives-players-billions-of-credits/
如有侵权请联系:admin#unsafe.sh