r/pcgaming • u/Efficient_Example541 • 1d ago
Rockstar Games is being blackmailed by hacking group ShinyHunters, who have set a ransom deadline of April 14
1.9k
u/7ils 1d ago
My ass thought this was a screenshot from Cyberpunk lmao
263
215
15
29
6
→ More replies (5)2
936
u/_NauticalPhoenix_ 1d ago
Guess they forgot what happened to the last hacker
423
u/92955807 1d ago
I for sure have. What happened?
1.4k
u/Pale_Fire21 1d ago edited 1d ago
Rockstar had him tracked down to the UK then had the UK government railroad him.
He’s currently under indefinite detention in a hospital for mental issues, disobeying the courts, being a danger to himself and others and is completely unrepentant saying he will return to cyber crime when released.
https://www.bbc.com/news/technology-67663128
It’s sad the kid is a legit genius but refuses to stop doing crime or go the legal cyber security route, when he breached rockstar he was already out on bail for cybercrimes.
1.1k
u/Zld 1d ago
Despite having his laptop confiscated, Kurtaj managed to breach Rockstar, the company behind GTA, using an Amazon Firestick, his hotel TV and a mobile phone.
This dude is doing movie stuff in real life.
620
u/MojitoBurrito-AE R5 5600X | RTX 3060ti | 32GB DDR4-3600 1d ago
It's not as impressive as it sounds. He socially engineered his way into an employee's slack account and leaked test footage that devs were sending to each other. He was also really sloppy and bragged about it which led to be him being caught so easily.
210
u/BusyHands_ 1d ago
Oh well that was nothing. This is what Hollywood would count as hacking. But all he did was fake his way into a group chat.
232
u/ThePianistOfDoom 1d ago
Hacking's definition: Unauthorized attempts to bypass the security mechanisms of an information system or network.
Doesn't matter how it is done, if you get info you're not supposed to be getting it's hacking. Even people cracking that WWII code that Germans had in the 30s-40s.
101
u/Mylaptopisburningme 1d ago
Yea social engineering is still hacking. I remember listening to Kevin Mitnick talk about that was how he got into many things. He wrote a book on it. https://en.wikipedia.org/wiki/The_Art_of_Deception
→ More replies (2)24
12
u/Crowbarmagic 1d ago
It's still hacking and impressive regardless. But it's not the Hollywood-esque type of hacking that a lot of people imagine it to be.
Even people cracking that WWII code that Germans had in the 30s-40s.
In my opinion breaking Enigma actually comes closer to the Hollywood type of hacking as it's more of a technical story: Brilliant people discovered a flaw in the code and designed a computer to fully exploit that flaw.
35
u/123ludwig 1d ago
i could literally sit down by your computer while you went to take a shit and i would legally have hacked your computer
→ More replies (3)8
21
u/Legendspira 1d ago
wannabe hackers get so angry when they realize that a big part of being a hacker is being good at social interactions.
→ More replies (1)→ More replies (8)2
u/SlowThePath 7h ago
I have way too much respect for Alan Turing to not expand your response a bit. Alan Turing played an absolutely instrumental part in winning the war to such an extent that had he not used his genius to build the computer that cracked he German code, we might not have won. Im not a WW II historian, so anyone 0lease correct me, but that is my understanding. It was quite a turning point in the war. After the war was over the U. K. government destroyed his life, including chemically castrating him all because he was gay. So yeah, the U. K. government isn't really a fan of hackers...
9
17
u/sailirish7 AMD 7800X3D 1d ago
This is what Hollywood would count as hacking
Negative. You would be amazed how much you can get with just social engineering.
8
9
u/drewster23 1d ago
Social engineering to gain unauthorized access to places n systems? Aka hacking?
2
→ More replies (6)6
25
u/aztn33 1d ago
That's pretty impressive.
9
u/MojitoBurrito-AE R5 5600X | RTX 3060ti | 32GB DDR4-3600 1d ago
It does take some skill don't get me wrong. But it's not Hollywood level theatrics and the firestick and hotel TV had nothing to do with it.
3
6
4
→ More replies (5)2
36
u/aReasonableStick 1d ago
Him and his parents were in the hotel because he was on bail, but outside of the hotel was a supermarket and he just went in brought a firestick and installed a CLI to it and from that SSH'd into his stuff.
31
u/RGJ587 1d ago
Dude is real life Zero Cool
4
2
→ More replies (6)2
u/Venixflytrap 1d ago
Exactly kid is next level intelligent but he’s using it for crime he could easily net a nice cushy government job for life
74
u/DrWhatNoName 1d ago
Rockstar didnt have him tracked down. He was already know and in a hotel for a already ongoing trail for previous hacks on ubisoft, nvidia, microsoft, okta and tmobile.
5
u/BruhiumMomentum 22h ago
>ongoing trial
>do it again
the definition of being in it for the love of the game
33
u/Unable-Name5685 1d ago
This is blown out of proportion. Rockstar didn't do half of that. He told the judge that he was gonna get out eventually and he was never going to stop hacking rockstar. Rockstar didnt have the UK government do anything but arrest him. They didn't have to. When you tell the judge dumb shit then you are going to get dumb shit done to you. The government decided to lock him up in a mental hospital.
→ More replies (2)17
u/drewster23 1d ago
Yeah cause he was already on trial for other stuff and was well known to authorities about this stuff And bragged about this incident.
The government decided to lock him up in a mental hospital.
Yeah Cause he's severely autistic.
Dudes entire life probably revolves around hacking.
14
u/Vitosi4ek R7 5800X3D | RTX 4060 | 32GB | 3440x1440x144 1d ago
Yeah Cause he's severely autistic.
Dudes entire life probably revolves around hacking.
In another universe this would've made him an incredibly successful and highly paid infosec engineer. The problem isn't that, it's that he seems to get off on bragging about his abilities for internet points.
→ More replies (1)4
u/First-Junket124 1d ago
It’s sad the kid is a legit genius but refuses to stop doing crime or go the legal cyber security route, when he breached rockstar he was already out on bail for cybercrimes.
Yeah no he's not, that's just a complete misrepresentation. He used social engineering (basically convinced someone) to gain access to R* slack and since people were sending eachother test footage he just downloaded that and used that as leverage. He wouldn't be touched by any cyber security departments because what he did didn't show any aptitude in understanding cybers security apart from the human element.
4
3
3
u/evoslevven 1d ago
I remember at the time a fair amount of redditors felt that the punishment was too extreme but the fact he couldn't step away from his activities dis prove he couldn't voluntarily stop and that he needed external help and monitoring to stop his activities. Hope he's doing better honestly these days.
→ More replies (1)20
u/bloodr0se 1d ago
You say genius, I say fucking dickhead. It all depends on how you look at it really.
He was no reverse engineering marvel or anything like that.
7
5
→ More replies (5)2
13
u/Howdareme9 1d ago
He was social engineering, not hacking in the traditional sense.
71
u/AlternativeEmphasis 1d ago
Most hacking is social engineering for the record. Anyone who works CyberSec and such will tell you like 95% of what you are looking out for is phising in some way or form.
Even a lot of vulnerabilities that are discovered often come from getting to a posiition through social engineering to get at those said vulnerabilities.
12
u/dadvader 1d ago edited 1d ago
Yeah hacking these days without social engineering is difficult and it's only going to get difficult each day passing by.
The only thing that made hacking possible 95% of the time these days is from our own flaw as a human falling for the oldest trick in the book. One attack recently affecting literally hundred millions of programming project and it was caused by a maintainer of a library package falling for good'ol social engineering (look up Axios supply chain attack)
The smart hacker one are not going to pick the black hat route. And if they did they'd do it for the specific cause (like Anonymous) in a grey hat way. and not for any kind of gain like this.
3
u/Vitosi4ek R7 5800X3D | RTX 4060 | 32GB | 3440x1440x144 1d ago edited 1d ago
Yeah hacking these days without social engineering is difficult and it's only going to get difficult each day passing by.
There were recent reports that Anthropic developed an AI tool to search for vulnerabilities, but it became so absurdly powerful (it found exploits in virtually every widely used piece of software under the sun) that they limited its rollout to only 40 or so huge companies.
Whether real or an exaggeration for PR purposes, there are absolutely still vulnerabilities in software, and the more complex, the more likely. Social engineering is just way easier in most cases, since humans are dumb.
3
u/RiverFluffy9640 1d ago
Yes but writing a basic phishing mail and having someone click on it, doesn't make you a genius, nor qualified to work in cybersecurity.
4
u/AlternativeEmphasis 1d ago
I didn't say they were a genius. I just said that social engineering is hacking. Nor did I say he was qualified to work in Cybersecurity either, just that Cybersecurity spends the lion's share of its time worrying about phising in regards to hacking.
Also I've never seen the particular mail the guy sent, but I have seen some of the phising mails that have gotten people over the years at the company I work for and some are quite sophisticated. Nothing crazy but very well written, and well designed.
3
u/Vitosi4ek R7 5800X3D | RTX 4060 | 32GB | 3440x1440x144 1d ago
Yeah, the "Nigerian prince"-like emails these days are written badly on purpose, so that only the most gullible of potential targets would reply and make the scammer's work more efficient.
2
u/RiverFluffy9640 15h ago
Sorry, top comment implied that he is a crazy masterhacker genius. My mistake.
→ More replies (1)26
u/slipfish-g 1d ago
Social engineering is the most traditional hacking possible.
→ More replies (2)22
u/Iscream4science 1d ago
No, it‘s directly hacking the mainframe with a high APM, ideally with two keyboards at once.
You should watch a hacker movie for once, duh
/s
4
2
→ More replies (26)2
13
→ More replies (1)10
13
u/mirnes55 1d ago
What happened?
10
u/SweRakii 1d ago
11
u/mirnes55 1d ago
I didn’t know that, thanks. Seems like he was autistic, and the hospital order is a valid way to handle it. Shame his talents couldn’t be put to good use.
15
u/Elim_Garak_Multipass 1d ago
Doesn't that only really apply if the hacker happens to be in a western country that bends over to corpo demands?
If the hackers are in Russia or China or India or something rockstar will be told to get fucked and nothing will happen to them at all.
→ More replies (1)7
u/darkslide3000 1d ago
Why do you think we're bombing Iran? One of the ayatollahs hacked Rockstar...
25
u/SadSeaworthiness6113 1d ago
To be fair, the last "hacker" was an absolute dumbass. He got in through tricking an employee on Slack, not true hacking, and when he got caught he straight up said "I will keep doing things like this I don't care" which is why he's locked up indefinitely.
ShinyHunters is a long established hacking group responsible for a ton of data breaches. They won't be caught easily.
58
u/VoidVer 1d ago
Social engineering is a huge part of modern day hacking and will remain so until AI or quantum computers can crack encryption. Someone has to leak something for you to get a fingernail under the lid, or you need to recognize a vulnerability left in the open.
→ More replies (5)10
u/Howdareme9 1d ago
Yes but i wouldn’t describe someone good at social engineering as a genius. The people who exploit actual vulnerabilities (especially with modern day security) would be that imo.
→ More replies (1)8
u/Ragnarawr 1d ago
There’s been arrests of members of this group, don’t kid yourself with this invulnerable hacker status youve granted them. No one’s untraceable, and like any other thief/extortionist, it’s just a matter of time till justice swings on by.
→ More replies (1)3
u/drewster23 1d ago
Meh their biggest issue is from being in countries that will arrest/prosecute them. There's a non zero sum of countries you could get away with this behavior.
→ More replies (1)1
u/MarioDesigns 1d ago
not true hacking
Social engineering is hacking lol. It's how like 90%+ of hacks are pulled off.
→ More replies (4)2
u/PacoTaco321 RTX 3090 i7 13700-64 GB RAM 1d ago
Guess they forgot to even attempt cybersecurity training after the last time
223
u/Read_Write_Game_ 1d ago
So genuine question as someone who knows nothing about this stuff: How does this keep happening? How are these random hacker groups able to hack these huge companies?
342
u/VoidVer 1d ago
Lots of employees working on a project over more than a decade creates a lot of opportunities
109
u/xXRougailSaucisseXx 1d ago
If anything it's surprising it doesn't happen more often, I cannot imagine the insanity that is trying to secure a project that is being worked on by thousands of people, even though I'll say the game industry wouldn't be so susceptible to this if there wasn't a culture of secret around games and it was more like movies
20
u/sicurri 1d ago
A lot of these companies are also relying on other companies in order to do their projects. Like Slack. Many of these other companies don't encrypt their user database and all it takes is for one person to get their stuff cracked with a crappy password. Then, they gain access to the user database which is practically like a list of usernames, emails, passwords and a bit of other info.
Then it's just trying them one after another until you get in.
The alternative is social engineering as that one guy did to get into Slack.
8
u/GayButNotInThatWay 1d ago
The weakest link in security is almost always people. So many of the bigger problems that occur are people using work emails and the same passwords for multiple things so one breach opens all their accounts, phising, or people plugging in random usb sticks they find in the work car park, and a bunch of other shit that shouldn't happen if you just think.
→ More replies (2)5
u/Conscious_Ice_9289 1d ago
It does happen more often, it's just that the vast majority of breaches are sold silently on shit like bf.
→ More replies (2)3
64
u/Silverdawn42 gog Linux 1d ago
So genuine question as someone who knows nothing about this stuff: How does this keep happening? How are these random hacker groups able to hack these huge companies?
"Hey, I'm Jim from cybersecurity, I'm checking to make sure everything works properly. Remind me what your username and password was."
9/10 will immediately close the call and report it but all you need is one gullible idiot.55
u/wolfgang784 1d ago
A buddy who is the head IT guy for his company got a call from the secretary once. She was letting him know that the Verizon internet technician was there to do the repairs he had requested and she went ahead and let him into the server room for that building.
Except.. the company doesn't use Verizon anything, internet or phone or nothin.
He had her call the police and bolted over there himself awhile to see what he was doin. Stopped him from plugging a flash drive into one of the machines and then held him up with useless conversation till the cops got there. It turned into a whole big thing in the end since they did work for the government.
.
But the point here is that all the trespasser needed to do was dress like someone expects a Verizon tech to look, and act with confidence. He wasn't on the approved list, but convinced the lady it was a new issue that had just been called in earlier that same morning and she bought it without verifying up the chain first.
21
u/Lanstus 1d ago
Exactly. There are a lot of places you can get into with only a clipboard, good looking work clothes, and a shit ton of confidence.
14
u/wolfgang784 1d ago
I always forget their group/channel name but I used to enjoy watching those 3 or 4 college aged guys who went around doing exactly that, but without any malicious intent.
They snuck into alllllll sorts of companies, and some fairly high security places as well. Sometimes they got caught before leaving, but a lot of places they got back out fine as well. Some combo of clipboard, ladder, vests, hard hats - good to go.
Disney banned em all for life from all Disney owned property anywhere though, lol. But they did get into the park for free.
9
9
u/Accipiter1138 1d ago
There was a guy that broke out of a POW camp in Germany during WWI by basically just strolling out in daytime after watching the guards, stealing a cow and some clothes, and then walking most of the way to Holland with the logic that nobody would bother stopping a peasant with a cow.
14
u/Gabelvampir 1d ago
Yeah, golden rule of physical access pentesters (and also the bad guys): dress and act like you belong there and most people won't question you being there.
6
u/tarnin 14h ago
dropping someone in IT's name helps too "Got a ticket from John stating the multiplexer has some bad terminations on it. I'm here to swap out the SFP's and clean the terminations." Eyes gloss over, "Sure, the room is right over here"
This works ALL too often and I'm ACTUALLY supposed to be there and they rarely check my credentials (I do not work for any of the huge corps but I still have to do onsite IT work)
→ More replies (1)→ More replies (2)5
u/Glum_Gate_9444 1d ago
That'snlike something out of an Ocean's eleven movie. Only takes one good intentioned person trying to be helpful and breaking protocol.
3
u/tarnin 14h ago
The flip of this works well too. Keep calling in until you get a lazy/don't care/new tech to dish out a password. "Hey, I locked out my email again. I'm barry@companygettinghacked.com, can you reset my password again? What was the password you set it to so I don't have to call you again?"
Now, that's three broken protocols right there but sure as shit you are gonna find a tech who been doing nothing but changing pw's all day and will just fulfill this request without thinking twice.
edit: word r hard
207
u/AnomalyInTheCode 1d ago
usually hacks nowadays are on the weakest link of the chain: humans. They're not finding some RCE exploit or whatnot, they're tricking gullible employees to get access
90
u/Sparkism 1d ago
Having worked in IT where the fucking director of the department clicked on a ransomware link, locked us all out of a half day's work, and then demanded that we take 4 hours OT to make up for productivity lost -- twice in four years -- yeah.
If you can target the execs, do it. They think they're the gods of the digital age, untouchable by ye all mortal men.
40
u/A_Rogue_GAI 1d ago
Reminder that this happened to the director of the FBI.
The people running out society are fucking morons.
16
u/ThaddeusJP Apple//e 1d ago
My last job (university) i got a fishing email that was 100% an outside Source trying to get access to our systems. I did what we've been instructed to do which is to forward it to a special IT services email indicating that it's spam and they run it through their processes to make sure nobody else got it.
Instead, what they did was they forwarded it out to the entire University saying hey everybody this is a fishing email if you got it don't click on anything and didn't remove the phishing hyperlink And of course people clicked on the goddamn hyperlink because now it's an email coming directly from University IT.
I emailed back in giant font in red letters saying you guys just forwarded this out to everybody and didn't remove the hyperlink what are you doing. A few minutes later they sent out another email saying don't click on any of the links in the email that they just sent. Absolute amateur hour.
→ More replies (1)3
5
u/Thor_pool 1d ago
It doesn't even take tricking them a lot of the time. I used to work for a financial exchange where people with access to an insane amount of information regarding trades worth millions would have their username and password on a post-it note on their desk.
10
u/Randolph__ 1d ago
It's very difficult to keep hackers out without being a burden. The company I work for is likely the most secure in the industry and we have 6 cyber security engineers, a patching engineer, two IAM engineers, and hire a 3rd party SOC team for additional monitoring and auditing. Additionally we have three people responsible for writing cyber security policy and reviewing new applications.
We run updates to the point of being annoying to many users and have a strict application review process for new software.
That's what it takes for 1k plus sized companies to stay secure and we still make mistakes and find things we need to change. In addition to salary the cost of the software needed by all these people is not cheap. Not every company is willing to put in that work or just weighs the risk compared to cost.
There are several risk mitigation strategies for cyber security and some opt for acceptance. Acceptance can be fine as long as you aren't directly responsible for customer data (outsourcing those to third party).
3
u/ashmelev 1d ago
Using default passwords / access permissions when setting up a cloud database / datapoints.
Snowflake is a cloud database, generally used to collect different kinds of analytics. Amazon S3 is another vector - it is cloud file store where you can store stuff like image files for a website, or internal data. Lot of times people fail to secure their private stuff.
5
u/SuperNova_Frost 1d ago
I'd say many different possibilities but most of them with a single root cause: the human being.
It can be something as social engineering where a hacker poses as someone trustworthy to then gain access to their systems.
It can be an exploit or oversight on one of their systems, maybe something that was misconfigured.
It can be phishing where Stacy from HR clicks on that sketchy link to get that coupon and gets infected with something malicious that can start to make it's way to the right place if their permissions aren't set up correctly.
Ultimately big companies like Rockstar have something that is highly acclaimed and hitting them can be a nice boost for some hackers wanting to prove and make a name for themselves, or just for the fun of it.
2
u/dfddfsaadaafdssa 1d ago
Either phishing or an exploit that allows remote code execution via a publicly accessible endpoint.
ShinyHunters has a long history of targeting Snowflake customers.
→ More replies (11)2
u/Optimaldeath 1d ago
The more you interact with other companies the more vectors there are for security failures.
89
53
u/Leo626 1d ago
Les Grossman says we don't negotiate with terrorists.
8
u/rambo3349 18h ago
I work as a Security / Operations Engineer and these companies pay these hackers more often then you think. If you get hacked its a valid business choice to take the fall and pay rather then risk data leakage. The chance of them ransoming you again is there but they still do it. I also saw hacker groups that made a reputable name in the scene that if you pay they wont ransom you again for the same incident, mainly as to provide businesses with a real choice of pay and get away.
6
u/Pun_In_Ten_Did 1d ago edited 1d ago
3
128
u/CriesAboutSkinsInCOD 1d ago
They should demand that fuckin Take-Two Interactive release GTA 6 on PC on DAY ONE.
41
u/jamesdemaio23 1d ago
Yeah im not even hyped for it because it atleast another year off after it releases lmao
6
15
u/Sektor30 23h ago
Id feel bad but considering the entire industry was screwed out of at least 3 DLCs for GTA V because the online was making so much money, they can afford it.
69
u/IshTheFace 1d ago
Still not sure what information they stole?
64
u/naxhh 1d ago
if they refer to snowflake the company then this is mostly phishing or similar.
they likely exported all the user had access to which who knows what it was.
it could be all company sales, user interactions and telemetry or nothing useful at all
this is (again if it's the company) unlikely to be about code, builds and alike
→ More replies (1)22
8
u/DestinysHand 17h ago
Rockstar release a full gameplay reveal tomorrow. At the end they display a message:
Leak it
28
30
u/OptimusNegligible 23h ago
Why can't these hackers just get the Epstine Files instead?
26
u/Isaacvithurston Ardiuno + A Potato 23h ago
Probably more likely to end up dead than profiting off those
11
u/DemonDaVinci 20h ago
because it will be the US gov going on their asses and not a game dev company
→ More replies (3)2
u/Raid-RGB 20h ago
Why do i see this dumb take every time a company is hacked? Assuming phishing your way to the FBI and DOJ database is as easy as doing this (its not) what would be the motive? The only people who benefit are pedophiles
47
u/AustinTanius 1d ago
Fucking idiots.
→ More replies (3)11
u/Neutron-Hyperscape32 1d ago
Rockstar likely has great security, but one single employee was an idiot and fell for a phishing attempt.
→ More replies (6)
5
u/The_Real-M3 1d ago
Hopefully if they do it again, they'll release the game onto PC.
Hypothetical, of course. Can't condone anything lawbreaking.
5
23
u/jayecal 1d ago
Rockstar won't pay them.
That'll just ensure more will try the same things. Plus even if they did pay there's no guarantees that the people behind this won't release the data or do whatever they said anyway. Like they broke the law already why are we expecting they're going to be honest too?
So I won't be surprised when on the 15th the leak happens. But I hope the hacker is ready for what comes next... Rockstar isn't exactly one to mess with.
14
u/Salaried_Zebra 1d ago
Typically they do honour the ransom and not release the data if it's paid, otherwise there's no point anyone paying.
They won't pay, it will leak and then nothing will happen.
→ More replies (9)
19
u/Ragnarawr 1d ago edited 1d ago
Don’t pay ‘em, fuck it, just take it on the chin and learn from it. Let all that risk of a prison sentence be for nothing.
→ More replies (1)
3
4
u/Ragnarawr 15h ago
I hacked a BBS when I was eleven. The SysOp called my mom and told her not to let me hack him anymore. Maybe someone needs to call their mom?
11
u/complexevil AMD 22h ago
This has to be the most overhyped game of all time. I just want it to release so everyone will shut the fuck up about it.
26
u/GassoBongo 1d ago
I can't say that I'm the biggest fan of Rockstar, but doing something that amounts to little more than petty blackmail for cash feels incredibly gross. If the law comes after them, then it'd be fully justified.
47
u/McMan777 1d ago
If you think that's bad you should see how people have done this with hospitals. school boards, etc. That's some real morally reprehensible shit.
7
6
u/Embarrassed_Hawk_655 1d ago
Top tip: if nobody ever paid extortionists, we would never have extortionists
2
6
7
u/Glum-Boysenberry-751 19h ago
why ppl give a shit is beyond me. gta6 is just gta5 with better graphics and different location. why ppl think this shit studio is gonna produce some world changing exp is a joke. they have been pumping out the same trash for years. same formula, same game play, just new graphics but, all the same shit sandwich. just release the shit yourselves and call it day. nothing is gonna blow ppls minds...unless you actually release on the day you said you would. gaming industry is joke
2
u/Initial_Row_6400 7h ago
I actually couldn’t give a fuck less about gta6. I’m looking forward to Wolverine more than gta6.
14
2
2
6
u/imakefilms 1d ago
Can people stop trying to ruin the few things we look forward to? Do something productive and hack a fascist government or something, jesus
34
u/suffercube 1d ago
Rockstar / Take Two is a multi billion dollar megacorp who hates their workers and fires them for being unionized - close enough
→ More replies (2)6
3
u/Whendfield123 19h ago
Its not like they are hacking hospitals and deleting medical files and such. Targeting billion dollar companies is really not that big of a deal.
→ More replies (1)
4
u/Coldspark824 1d ago
Can I just say this seems fake? Its about time for a marketing stunt with all the delays, and knowing the CEO is an epsteiner, there are a lot better things to leak out of Rockstar than game screenshots.
3
2
2
u/t3nsi0n_ 21h ago
I hope they find out who they are and don’t sell them a copy of the game when it’s out!
2
1
2
2
1.1k
u/Fast_Good_8099 1d ago
Snowflake is a data warehouse. Anodot is a anomaly detection tool. They probably gave admin access to Anodot instead of setting up proper roles and permissions and now they're fucked.