Electronic Arts (EA)

Electronic Arts (EA)

Hackers breached Electronic Arts (EA) by acquiring authentication cookies for an internal Slack channel from a dark web marketplace. Using these, they impersonated an EA employee, tricked IT support into granting network access, and exfiltrated **780GB of source code**, including the FIFA 21 game and server-side tools. After failing to extort EA or sell the data (valued at $28M initially), the attackers dumped the entire cache on underground forums and torrent sites. EA confirmed **no player data was compromised**, and the stolen assets were primarily proprietary code with limited black-market value. The company stated no risk to player privacy or business operations, though security improvements were implemented. Law enforcement is involved in the ongoing investigation.

Source: https://therecord.media/hackers-leak-full-ea-data-after-failed-extortion-attempt

TPRM report: https://www.rankiteo.com/company/electronic-arts

"id": "ele4503245102825",
"linkid": "electronic-arts",
"type": "Breach",
"date": "6/2021",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'customers_affected': 'None (no player data '
                                              'compromised)',
                        'industry': 'Video Games',
                        'location': 'Redwood City, California, USA',
                        'name': 'Electronic Arts (EA)',
                        'size': 'Large (12,900+ employees as of 2021)',
                        'type': 'Public Company'}],
 'attack_vector': ['Credential Theft (Authentication Cookies)',
                   'Social Engineering',
                   'Internal Network Access via Slack'],
 'customer_advisories': 'None issued (no customer data compromised)',
 'data_breach': {'data_exfiltration': 'Yes (780GB)',
                 'file_types_exposed': ['Source Code Files',
                                        'Server-Side Tools'],
                 'personally_identifiable_information': 'No',
                 'sensitivity_of_data': 'High (Proprietary Code, but no '
                                        'PII/Financial Data)',
                 'type_of_data_compromised': ['Source Code',
                                              'Internal Development Tools']},
 'date_detected': '2021-06-10',
 'date_publicly_disclosed': '2021-06-10',
 'description': 'Hackers breached Electronic Arts (EA) in June 2021, stealing '
                '780GB of source code, including FIFA 21 and internal tools. '
                'After failing to extort EA or sell the data, they released '
                'the full cache on underground forums and torrent sites in '
                'July 2021. The breach was facilitated by purchasing '
                'authentication cookies for EA’s internal Slack channel from '
                'the Genesis dark web marketplace, followed by social '
                'engineering to gain network access. EA confirmed no player '
                'data was compromised and stated the incident would not impact '
                'games or business operations.',
 'impact': {'brand_reputation_impact': 'Potential reputational damage due to '
                                       'high-profile leak, though EA '
                                       'downplayed risks',
            'data_compromised': ['Source Code (FIFA 21, Internal Tools)',
                                 '780GB of Internal Code Repositories'],
            'identity_theft_risk': 'None (no player data accessed)',
            'operational_impact': 'None reported; EA stated no impact on games '
                                  'or business',
            'payment_information_risk': 'None',
            'systems_affected': ['EA Internal Slack Channel',
                                 'Code Repositories',
                                 'Server-Side Service Tools']},
 'initial_access_broker': {'data_sold_on_dark_web': 'No (attempted sale '
                                                    'failed; data dumped for '
                                                    'free)',
                           'entry_point': 'EA Internal Slack Channel (via '
                                          'stolen authentication cookies)',
                           'high_value_targets': ['Source Code Repositories',
                                                  'FIFA 21 Game Files']},
 'investigation_status': 'Ongoing (as of July 2021, with law enforcement '
                         'involvement)',
 'lessons_learned': '1. Authentication cookies (e.g., Slack) are high-value '
                    'targets for initial access brokers. 2. Social engineering '
                    'remains effective against IT support teams. 3. '
                    'Proprietary source code, while valuable to the company, '
                    'may lack resale value in cybercriminal markets. 4. Public '
                    'disclosure strategies can mitigate reputational harm even '
                    'after large-scale leaks.',
 'motivation': ['Financial Gain (Extortion)',
                'Data Monetization (Failed Sale)'],
 'post_incident_analysis': {'corrective_actions': ['Unspecified security '
                                                   'improvements implemented '
                                                   'by EA.',
                                                   'Collaboration with law '
                                                   'enforcement for criminal '
                                                   'investigation.'],
                            'root_causes': ['Purchase of EA Slack '
                                            'authentication cookies from '
                                            'Genesis marketplace.',
                                            'Successful social engineering of '
                                            'IT support to gain network '
                                            'access.',
                                            'Lack of segmentation or '
                                            'monitoring for unusual access '
                                            'patterns.']},
 'ransomware': {'data_encryption': 'No',
                'data_exfiltration': 'Yes',
                'ransom_demanded': ['$28 million (initial sale attempt)',
                                    'Undisclosed sum (extortion attempt)'],
                'ransom_paid': 'No'},
 'recommendations': ['Implement multi-factor authentication (MFA) for internal '
                     'communication platforms like Slack.',
                     'Conduct regular security training for IT support staff '
                     'to prevent social engineering attacks.',
                     'Monitor dark web marketplaces for stolen credentials or '
                     'authentication tokens.',
                     'Segment internal networks to limit lateral movement '
                     'post-breach.',
                     'Evaluate the sensitivity of source code and apply '
                     'additional access controls or encryption.'],
 'references': [{'date_accessed': '2021-07-26',
                 'source': 'The Record',
                 'url': 'https://therecord.media'},
                {'date_accessed': '2021-06',
                 'source': 'Motherboard (Vice)',
                 'url': 'https://www.vice.com/en/topic/motherboard'}],
 'response': {'communication_strategy': ['Public Statement (The Record)',
                                         'Downplayed Risks'],
              'incident_response_plan_activated': 'Yes',
              'law_enforcement_notified': 'Yes',
              'remediation_measures': ['Security Improvements (unspecified)'],
              'third_party_assistance': ['Law Enforcement',
                                         'Cybersecurity Experts']},
 'stakeholder_advisories': 'EA issued statements to media outlets (The Record) '
                           'confirming no player data was accessed and no '
                           'expected business impact.',
 'threat_actor': ['Unknown Hacking Group', 'Opportunistic Cybercriminals'],
 'title': 'Electronic Arts (EA) Data Breach and Source Code Leak',
 'type': ['Data Breach', 'Source Code Theft', 'Extortion Attempt'],
 'vulnerability_exploited': ['Weak Authentication (Slack Cookies)',
                             'Human Error (IT Support Tricked)']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.