Being a very popular and profitable game, it is normal for outsiders to try to access its servers to steal information and sell it to the highest bidder. According to different sources, a group of hackers with very little notable activity, Mogilevich, would have accessed the servers of this developer and seized them. 189 GB of dataincluding payment data, source code, personal information and more, information apparently already for sale on the Dark Web.
Hacking of Epic Games servers
From Epic Games they claim that they have no proof that its servers have been compromised, according to the Eurogames media which contacted Epic Games. In addition, Epic also clarifies that, from this unknown group of hackers, they have not contacted the company to ask for a ransom, something common in this type of attacks and thus be able to obtain financial remuneration.
This group made the hack known through a post account on on sale until March 4. However, he offers us no evidence that can prove this.
End of 2023, Insomniac games suffered an attack in which hackers from the Rhysida Group stole 1.67 terabytes of information about the future development plans of this study, virtually all current and future content of this study, demanding $2 million in exchange. Ultimately, as we all know, the Sony studio did not give in to blackmail and the data was published on the Internet.
Avoid problems and change your password
All companies that have suffered any type of attack that endangers the security of their customers’ data are obliged to inform the authorities
Anyway, whether this is true or not, to avoid problems in the future we must first of all activate the two-step authenticationbecause this way, if someone wants to access our account, they will need the code that Epic sends us by email to confirm that we are the owners of the account.
Additionally, it is also advisable to change the password. To change the Epic Games account password we must access our account using the following link, access the Password and security section from where we can also activate two-step authentication.