The logo of Capcom Co., Ltd. is displayed at Tokyo Game Show 2019 in Chiba, east of Tokyo, Japan, September 12, 2019. REUTERS/Issei Kato

Remember the Capcom network breach last November? The game company revealed it had to do with an outdated backup VPN device, allowing hackers to break in.

Capcom explained that they planned to remove the said old backup VPN device from the North American subsidiary but couldn’t due to COVID-19. As a result, the ransomware spread through Capcom’s internal network in both the US and Japan. It affected employees, business partners and customers, alike.

Basically, the said VPN was used as a security gateway for employees to gain remote access to corporate servers. Being vulnerable makes it ideal for hacking by simply knowing a user’s password or utilizing present flaws in the software.

Fortunately, Capcom has recovered from the incident and removed the older VPN devices from its system by upgrading to a better one. The internal system was also nearly restored. Capcom did not answer the ransomware group, who tried to extort the company to pay.

“As such, Capcom is not aware of any ransom demand amounts,” said the company.

LEAVE A REPLY

Please enter your comment!
Please enter your name here