The stolen code of ‘Cyberpunk 2077’ already has an owner, now it remains to wonder what he will do with it
This week the famous Polish company CD Projekt RED (CDPR) made a worrying announcement: hackers had gained access to their servers and stolen the source code of games like ‘Cyberpunk 2077‘ The ‘The Witcher 3‘. The company refused to negotiate with this group of hackers, which led to the code being auctioned two days later.
Now we know that the auction has closedHackers appear to have received a “good offer” and that code now has new owners. The question, of course, is what the buyer will do with that code.
Visible “faulty” copies?
The auction that started after the refusal to negotiate indicated that the minimum bid started from 1 million dollars, but that if someone offered 7 million dollars they could get that code and that data immediately.
Just in: #CDProjektRed AUCTION IS CLOSED. #Hackers auctioned off stolen source code for the #RedEngine and #CDPR game releases, and have just announced that a satisfying offer from outside the forum was received, with the condition of no further distribution or selling. pic.twitter.com/4Z2zoZlkV6
– KELA (ntIntel_by_KELA) February 11, 2021
That seems to have been what happened, because various sources indicated that the auction had closed and those responsible for it seemed to point out that the buyer was someone outside the forums in which the whole subject had moved.
The situation is certainly unique: CD Projekt RED had backup copies of everything and therefore the work invested in these games has not been lost.
The stolen code will also be affected by these flaws, but if the buyer decides to compile the code to resell copies of these games, they will do so with the latest development status of that code: correcting the bugs of that code is unfeasible.
That sale of defective copies It is one of the options that the buyer of the stolen code has access to, but that code can also be used for other things.
For example, as a basis for other projects derived from that code (which will be difficult to distribute without the security forces going after whoever does it), or even worse, as a basis for distributing malware of all kinds both in those illegal copies and in projects that take advantage of that code in the future.
Via | Engadget