Just a few hours ago, the video game manufacturer Rockstar Games confirmed While further details remain to be seen, claims to represent the same group that breached Uber's internal systems late last week; Uber now attributes the attack to the cybercriminal group LAPSUS$.
In the case of Uber, the first breach occurred after the attackers purchased a contractor's company password on the Dark Web . By bypassing the contractor's multifactor authentication (a growing problem, as Sophos recently reported ), the attacker was then able to gain access to employees' internal communication channels, such as Slack. Little is known about the attack strategy against Rockstar Games, but the attacker also claims that Slack served as a backdoor.
Chester Wisniewski, Principal Research Scientist at Sophos, commented on the attacks:
“The attacks on Uber and Rockstar Games feel like we are reliving the Lapsus$ attacks in late 2021 and early 2022. And in fact, Uber just attributed the breach to the Lapsus$ group.
While the cyberattack on interactive entertainment company Electronic Arts in 2021 began with criminals using stolen cookies to infiltrate , the Uber breach appears to have begun with another method of circumventing the multi Factor authentication using social engineering was used to gain access to Slack. This proves once again the statement that the security chain is only as strong as its weakest link - and all too often that is the people.
It is unclear at this point what enabled the initial compromise at Rockstar Games. But a group claiming to be the same hacker as Uber posted in-game footage of "GTA VI" and claimed the attack began with a social engineering attack similar to the attack on Uber. This is not surprising as it is an incredibly effective technique for initial compromises and exploits trust in privileged insiders.
Security is a system, and it needs redundancy no differently than an airplane or a spaceship. Accordingly, it must be designed to be fault-tolerant.
In all of these cases, it seems to have been enough to gain access as a trustworthy insider in order to then snake your way through various systems with criminal intentions. Networks must be designed to verify a person's identity and credentials when accessing a new or privileged area.
While not all details about the attacks are known, they serve as a good reminder to keep employees up to date on security culture and reiterate the importance of implementing additional authentication for users of sensitive areas. Social engineering can bypass certain multi-factor authentication solutions, so it is definitely worth introducing stricter policies for access to critical systems.”
Additional resources for reporting:
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

