Professional Documents
Culture Documents
Group No: 24
Date:
*************
PART B – Plan
Micro Project Report
GTA 5 CYBER ATTACK
Introduction:
The cyber threat landscape in the gaming industry is highly dynamic and increasingly challenging to
navigate. Attackers are not only developing new techniques to evade security, but threats—such as
DDoS attacks, account takeovers, and malware—are growing in complexity and precision. The
importance of having a robust defense against such attacks was highlighted by the 2020 cyber attack
on Grand Theft Auto V (GTA 5), a large-scale hack of the game’s servers that affected numerous
players worldwide. Meanwhile, gaming applications and architecture continue to evolve rapidly
during a period of increasing reliance on digital connections during the COVID-19 pandemic. Given
its high-profile mission and broad connectivity with the public, Rockstar Games, the developer of
GTA 5, presents cybercriminals a larger potential target than most gaming companies. In response,
the company has worked to improve its cybersecurity preparedness with efforts led by its IT
department. Nonetheless, in the year 2020 alone, GTA 5 experienced a significant cyber attack, which
included account takeovers and introduction of malware into the game’s systems. Consequently, it is
vital that gaming companies develop strong cybersecurity practices to protect themselves from
current and future threats.
Background
Grand Theft Auto V (GTA 5), developed by Rockstar Games, is a regular target of cyber attacks due
to its high-profile status and the extensive digital footprint of its online multiplayer platform, GTA
Online. Given its online presence of millions of active players and the sensitive nature of player data,
the game is highly vulnerable to intrusions. In 2020, GTA 5 experienced a significant cyber attack,
which highlighted the increasing threat of cyber attacks in the gaming industry. This year, in
particular, saw an uptick in cyber threats: phishing attempts and malware attacks increased
exponentially during the COVID-19 pandemic, which also saw a surge in online gaming due to
lockdowns and social distancing measures. The game’s cybersecurity challenges are further
exacerbated by the number and variety of IT devices used by players and the sheer volume of data the
game maintains. To illustrate, the below figure shows the types of cyber attacks commonly faced by
online games like GTA 5.
The cyber threat to Rockstar Games’ computer networks, particularly for Grand Theft Auto 5 (GTA
5), has been significant. Here are some key examples of past cyber breaches related to GTA 5:
• In 2023, Rockstar Games, the US-based gaming studio, experienced a cyber incident with a data
breach1. In this attack, cybercriminals leaked the full source code for GTA 51. The leaked code,
comprising 100GB, also included Python code for the upcoming sequel, GTA 6, and files from the
cancelled sequel, Bully 21.
• The leaked GTA 5 source code revealed references to as many as eight unreleased single-player
DLC packs1. However, Rockstar decided not to move forward with any single-player DLC
packs1. Instead, the studio launched the GTA Online version of the game and released multiple DLC
packs for the online multiplayer portion of GTA 51.
• In 2022, Rockstar confirmed a network intrusion that allowed someone to access and download
confidential information from their systems, including early development footage for the next
Grand Theft Auto2.
Effective cybersecurity demands focus and dedication, and accurately assessing threats and
identifying vulnerabilities is critical to understanding an organization’s risk. As an IT management
approach, cyber risk combines the probability of a threat with the potential monetary or reputation
loss the threat would cause if carried out. In order to understand such risk, it is imperative to
accurately assess threats and vulnerabilities. More broadly, cybersecurity is an important
component of the overall risk management process with its success ultimately measured by how
well it prevents malevolent attack and intrusion.
Conclusion:
In 2020, Rockstaí Games, the company behind Gíand ľheft Auto (GľA), confiímed a cybeíattack 1. A
hackeí bíoke into theií systems and stole confidential inteínal data, including eaíly development footage
foí the next highly-anticipated installment of the Gíand ľheft Auto seíies1. ľhe alleged hackeí behind the
leak claimed to be the same peíson who launched a wide-íanging attack on Ubeí the píevious
week1. ľhey shaíed a link to footage and clips fíom Gíand ľheft Auto 6, a title which Rockstaí has not
publicly confiímed is in development1.
ľhe hackeí, using the handle “teapotubeíhackeí,” initially offeíed data íelated to Gíand ľheft Auto 5,
which has alíeady been íeleased, foí nothing less than $10,000 but claimed they would not sell any of the
data íelated to Gíand ľheft Auto 6, which is still in development2. ľhe hackeí also claimed to have “GľA
5 and 6 souíce code and assets, GľA 6 testing build” and appeaíed to be attempting to negotiate a deal
with Rockstaí2.
Lateí, it was íevealed that the hackeí was an 18-yeaí-old Bíitish teenageí named Aíion Kuítaj3. He was on
bail foí hacking the softwaíe fiím Nvidia and Bľ/EE and also in police píotection at a ľíavelodge hotel
when he continued his hacking and bíeached Rockstaí Games3. He íeceived an indefinite hospital oídeí3.
***************
Teacher Evaluation Sheet
Name of Student: Raj Sandeep Darji Enrollment No: 2105630155
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense
(A) Process and Product Assessment (Covert above total marks out of 6 Marks)
5 Quality of Prototype/Model
6 Report Preparation
(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Defense