You are on page 1of 12

Micro Project report on

GTA 5 CYBER ATTACK (2020)

Academic Year: 2023-2024 Institute Code:0563

Program: Computer Engineering Semester: VI

Course: Network & Information Security (NIS)

Course Code: 22620

Group No: 24

Maharashtra State Board of Technical Education,


Mumbai (Autonomous) (ISO-9001-2008) (ISO/IEC 27001:20013)
Maharashtra State Board of Technical Education,
Mumbai
CERTIFICATE
This is to certify that,
Roll No Student Name Seat No Enrollment
No

72 Raj Sandeep Darji 2105630155

73 Manav Manish Naik 2105630158

74 Ansh Ganesh Dabholkar 2105630160

Of Sixth semester of Diploma in Computer Engineering of Institute Pravin Patil College


of Diploma Engineering and Technology, Bhayander (E) (Code: 0563) has completed the
Micro Project satisfactorily in subject: GTA 5 Cyber Attack for the academic year 2023-
2024 as prescribed in the curriculum.

Place: Bhayander (E)

Date:

MRS.HARSHALA DATE MRS.MANJULA ATHANI MRS.R B PATIL


Subject Teacher Head of Department Principal
PART A – Plan
Micro Project Proposal
GTA 5 CYBER ATTACK

1.0 Brief Introduction:


This project focuses on the 2020 cyber attack on Grand Theft Auto V (GTA 5), a popular online game. The
objective is to delve into the specifics of the attack, its implications on the gaming community, and the
countermeasures taken by the developers. The study will involve comprehensive research, including
gathering information from various books and online resources. The ultimate goal is to compile a
detailed report on the incident, shedding light on the significance of robust cyber security measures in
the gaming industry. This project underscores the increasing threat of cyber attacks in the digital age,
particularly in high-engagement platforms like online gaming, and emphasizes the need for continuous
advancements in cyber security.

2.0 Aim of the Micro Project:


To do the research and case study about GTA 5 CYBER ATTACK (2020)

3.0 Action Plan:


Sr. Details of Activity Planned Planned Name of
No Start Date Finish Date Responsible Team
Members
1 Selection of topic :- Raj,Manav,Ansh

2 Information collection from books : Raj,Manav,Ansh


We collected information
from various books listed
as,
1. Principles of computer
Security By Greg White
2. Computer Security By
Atul Kahate
3 Information collection from Raj,Manav,Ansh
web resources:-
We collected information’s
from various site’s
1) www.Google.com
2) en.wikipedia.org
4 Designing the project Raj,Manav,Ansh

5 Preparing the project Raj,Manav,Ansh

6 Formatting the project Raj,Manav,Ansh

7 Preparation of report Raj,Manav,Ansh


4.0 Resources Required:
Sr. Name of Specifications Qty. Remarks
No Resource/Material

1 MS Office 2010 For Window 1 Available

2 Internet Facility Google Search --- Available


Engine

3 Books and E-Books 1. Computer Security By Atul Kahate --- Available

*************
PART B – Plan
Micro Project Report
GTA 5 CYBER ATTACK

1.0 Brief Introduction:


This project focuses on the 2020 cyber attack on Grand Theft Auto V (GTA 5), a popular online game. The
objective is to delve into the specifics of the attack, its implications on the gaming community, and the
countermeasures taken by the developers. The study will involve comprehensive research, including
gathering information from various books and online resources. The ultimate goal is to compile a
detailed report on the incident, shedding light on the significance of robust cybersecurity measures in
the gaming industry. This project underscores the increasing threat of cyber attacks in the digital age,
particularly in high-engagement platforms like online gaming, and emphasizes the need for continuous
advancements in cybersecurity.

2.0 Aim of the Micro Project:


To learn research and case study about GTA 5 CYBER ATTACK (2020).

3.0 Course Outcomes Integrated:

a) Apply user identification and authentication methods.


b) Identify risk related to computer security and information hazards in various situations
c) Apply cryptographic algorithms and protocols to maintain computer security.
d) Apply measures to prevent attack on network using firewall.
e) Maintain secured networks and describe information security compliance standards.

4.0 Actual Procedure Followed:


1. Studied about The GTA 5 CYBER ATTACK (2020).
2. Distributed the tasks among the group members.
3. Each group member searched for their respective topic assigned to them.
4. Searched the information and case study for GTA 5 CYBER ATTACK (2020).
5. Started the documentation of the material.
6. Cleared all doubts related to project.
7. Made report and project report.
5.0 Actual Resources Required:
Sr. Name of Specifications Qty Remarks
No Resource/Material

1 MS Office 2010 For Window 1 Available

2 Internet Facility Google Search --- Available


Engine

3 Books and E-Books 1. Computer Security By Atul Kahate --- Available

6.0 Output of Micro project:


Abstract:
Online gaming has emerged as a new frontier for cyber attacks, with the 2020 attack on Grand Theft Auto V (GTA 5)
serving as a prime example. This project aims to investigate this significant event in the gaming industry, focusing on
the nature of the attack, its impact on the gaming community, and the response strategies employed by the game’s
developers. Through extensive research and analysis, the study will highlight the increasing threat of cyber attacks in
the digital realm, particularly in high-engagement platforms like online gaming. The findings will underscore the
importance of robust cyber security measures and the need for continuous advancements in this field to safeguard user
experiences and maintain trust in online gaming platforms.

Introduction:
The cyber threat landscape in the gaming industry is highly dynamic and increasingly challenging to
navigate. Attackers are not only developing new techniques to evade security, but threats—such as
DDoS attacks, account takeovers, and malware—are growing in complexity and precision. The
importance of having a robust defense against such attacks was highlighted by the 2020 cyber attack
on Grand Theft Auto V (GTA 5), a large-scale hack of the game’s servers that affected numerous
players worldwide. Meanwhile, gaming applications and architecture continue to evolve rapidly
during a period of increasing reliance on digital connections during the COVID-19 pandemic. Given
its high-profile mission and broad connectivity with the public, Rockstar Games, the developer of
GTA 5, presents cybercriminals a larger potential target than most gaming companies. In response,
the company has worked to improve its cybersecurity preparedness with efforts led by its IT
department. Nonetheless, in the year 2020 alone, GTA 5 experienced a significant cyber attack, which
included account takeovers and introduction of malware into the game’s systems. Consequently, it is
vital that gaming companies develop strong cybersecurity practices to protect themselves from
current and future threats.

Background
Grand Theft Auto V (GTA 5), developed by Rockstar Games, is a regular target of cyber attacks due
to its high-profile status and the extensive digital footprint of its online multiplayer platform, GTA
Online. Given its online presence of millions of active players and the sensitive nature of player data,
the game is highly vulnerable to intrusions. In 2020, GTA 5 experienced a significant cyber attack,
which highlighted the increasing threat of cyber attacks in the gaming industry. This year, in
particular, saw an uptick in cyber threats: phishing attempts and malware attacks increased
exponentially during the COVID-19 pandemic, which also saw a surge in online gaming due to
lockdowns and social distancing measures. The game’s cybersecurity challenges are further
exacerbated by the number and variety of IT devices used by players and the sheer volume of data the
game maintains. To illustrate, the below figure shows the types of cyber attacks commonly faced by
online games like GTA 5.

Types Of Cyber Attacks

The cyber threat to Rockstar Games’ computer networks, particularly for Grand Theft Auto 5 (GTA
5), has been significant. Here are some key examples of past cyber breaches related to GTA 5:
• In 2023, Rockstar Games, the US-based gaming studio, experienced a cyber incident with a data
breach1. In this attack, cybercriminals leaked the full source code for GTA 51. The leaked code,
comprising 100GB, also included Python code for the upcoming sequel, GTA 6, and files from the
cancelled sequel, Bully 21.
• The leaked GTA 5 source code revealed references to as many as eight unreleased single-player
DLC packs1. However, Rockstar decided not to move forward with any single-player DLC
packs1. Instead, the studio launched the GTA Online version of the game and released multiple DLC
packs for the online multiplayer portion of GTA 51.
• In 2022, Rockstar confirmed a network intrusion that allowed someone to access and download
confidential information from their systems, including early development footage for the next
Grand Theft Auto2.

Effective cybersecurity demands focus and dedication, and accurately assessing threats and
identifying vulnerabilities is critical to understanding an organization’s risk. As an IT management
approach, cyber risk combines the probability of a threat with the potential monetary or reputation
loss the threat would cause if carried out. In order to understand such risk, it is imperative to
accurately assess threats and vulnerabilities. More broadly, cybersecurity is an important
component of the overall risk management process with its success ultimately measured by how
well it prevents malevolent attack and intrusion.
Conclusion:

In 2020, Rockstaí Games, the company behind Gíand ľheft Auto (GľA), confiímed a cybeíattack 1. A
hackeí bíoke into theií systems and stole confidential inteínal data, including eaíly development footage
foí the next highly-anticipated installment of the Gíand ľheft Auto seíies1. ľhe alleged hackeí behind the
leak claimed to be the same peíson who launched a wide-íanging attack on Ubeí the píevious
week1. ľhey shaíed a link to footage and clips fíom Gíand ľheft Auto 6, a title which Rockstaí has not
publicly confiímed is in development1.

ľhe hackeí, using the handle “teapotubeíhackeí,” initially offeíed data íelated to Gíand ľheft Auto 5,
which has alíeady been íeleased, foí nothing less than $10,000 but claimed they would not sell any of the
data íelated to Gíand ľheft Auto 6, which is still in development2. ľhe hackeí also claimed to have “GľA
5 and 6 souíce code and assets, GľA 6 testing build” and appeaíed to be attempting to negotiate a deal
with Rockstaí2.

Lateí, it was íevealed that the hackeí was an 18-yeaí-old Bíitish teenageí named Aíion Kuítaj3. He was on
bail foí hacking the softwaíe fiím Nvidia and Bľ/EE and also in police píotection at a ľíavelodge hotel
when he continued his hacking and bíeached Rockstaí Games3. He íeceived an indefinite hospital oídeí3.

7.0 Skill Developed/ learning out of this Micro-Project:


1. Learned more about the GTA 5 Cyber Attack.
2. Learned about the background of GTA 5 Cyber Attack.
3. Learned about how many types of GTA 5 Attacks.
4. Method of Cyber attacks & more
5. Methods of cyber attacks.

***************
Teacher Evaluation Sheet
Name of Student: Raj Sandeep Darji Enrollment No: 2105630155

Name of Program: Computer Engineering Semester: SIXTH Course Title:


NETWORK AND INFORMATION SECURITY Code: 22620

Title of the Micro Project: GTA 5 CYBER ATTACK


Course Outcomes Achieved (COs):
a) Apply user identification and authentication methods.
b) Identify risk related to computer security and information hazards in various situations.
c) Apply cryptographic algorithms and protocols to maintain computer security. d) Apply
measures to prevent attack on network using firewall.
e) Maintain secured networks and describe information security compliance standards.

Evaluation as per Suggested Rubric for Assessment of Micro-Project


S Characteristic to be Assessed Poor Average Good Excellent Sub
r. (Marks 1-3) (Marks 4- (Marks 6-8) (Marks 9- Total
N 5) 10)
o

(A) Process and Product Assessment (Covert above total marks out of 6 Marks)

1 Relevance to the course

2 Literature Survey / Information


Collection

3 Completion of the Target as per


project proposal

4 Analysis of Data and Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)

7 Presentation

8 Defense

Micro-Project Evaluation Sheet


(A) Process and Product (B) Individual Presentation / Viva Total Marks
Assessment (6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about team work / leadership / inter-personal communication:


………………………………………………………………………………………………………………………………...
………………………………………………………………………………………………………………………………
Name & Designation of the Teacher: MRS.HARSHALA DATE (SR. LECTURER)
Dated Signature: ………………………………
Teacher Evaluation Sheet
Name of Student: Manav Manish Naik Enrollment No: 2105630158

Name of Program: Computer Engineering Semester: SIXTH Course Title:


NETWORK AND INFORMATION SECURITY Code: 22620

Title of the Micro Project: GTA 5 CYBER ATTACK


Course Outcomes Achieved (COs):
a) Apply user identification and authentication methods.
b) Identify risk related to computer security and information hazards in various situations.
c) Apply cryptographic algorithms and protocols to maintain computer security. d) Apply
measures to prevent attack on network using firewall.
e) Maintain secured networks and describe information security compliance standards.

Evaluation as per Suggested Rubric for Assessment of Micro-Project


S Characteristic to be Assessed Poor Average Good Excellent Sub
r. (Marks 1-3) (Marks 4- (Marks 6-8) (Marks 9- Total
N 5) 10)
o

(A) Process and Product Assessment (Covert above total marks out of 6 Marks)

1 Relevance to the course

2 Literature Survey / Information


Collection

3 Completion of the Target as per


project proposal

4 Analysis of Data and Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)

7 Presentation

8 Defense

Micro-Project Evaluation Sheet


(A) Process and Product (B) Individual Presentation / Viva Total Marks
Assessment (6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about team work / leadership / inter-personal communication:


………………………………………………………………………………………………………………………………...
……………………………………………………………………………………………………………………………
Name & Designation of the Teacher: MRS.HARSHALA DATE (SR. LECTURER)
Dated Signature: ………………………………
Teacher Evaluation Sheet
Name of Student: Ansh Ganesh Dabholkar Enrollment No: 2105630160

Name of Program: ComputerEngineering Semester: SIXTH Course Title:


NETWORK AND INFORMATION SECURITY Code: 22620

Title of the Micro Project: GTA 5 CYBER ATTACK


Course Outcomes Achieved (COs):
a) Apply user identification and authentication methods.
b) Identify risk related to computer security and information hazards in various situations.
c) Apply cryptographic algorithms and protocols to maintain computer security. d) Apply
measures to prevent attack on network using firewall.
e) Maintain secured networks and describe information security compliance standards.

Evaluation as per Suggested Rubric for Assessment of Micro-Project


S Characteristic to be Assessed Poor Average Good Excellent Sub
r. (Marks 1-3) (Marks 4- (Marks 6-8) (Marks 9- Total
N 5) 10)
o

(A) Process and Product Assessment (Covert above total marks out of 6 Marks)

1 Relevance to the course

2 Literature Survey / Information


Collection

3 Completion of the Target as per


project proposal

4 Analysis of Data and Representation

5 Quality of Prototype/Model

6 Report Preparation

(B) Individual Presentation / Viva (Convert above total marks out of 4 Marks)

7 Presentation

8 Defense

Micro-Project Evaluation Sheet


(A) Process and Product (B) Individual Presentation / Viva Total Marks
Assessment (6 Marks) (4 marks) (10 Marks)

Comments / Suggestions about team work / leadership / inter-personal communication:


………………………………………………………………………………………………………………………………...
……………………………………………………………………………………………………………………………
Name & Designation of the Teacher: MRS.HARSHALA DATE (SR. LECTURER)
Dated Signature: ………………………………

You might also like