AI DevwWrld Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Mogilevich's double game in the shadow of Epic Games

The veil is lifted on Epic Games' data hoax

A group called Mogilevich simulated a ransomware attack against Epic Games, pretending to have stolen data. In reality, they wanted to scam other hackers, not Epic Games.

This pill is also available in Italian language

Recently, alarming rumors have been circulating among Epic Games users, with accusations that the company had been the victim of a large-scale ransomware attack. There were rumors of the theft of 189 GB of data, including personal information and source codes for possible new games. However, Epic Games promptly denied the substance of these assertions, suggesting the unfoundedness of the claims.

The real deception: the Mogilevich group

The core of the incident turned out to be not a common cyber attack but a threat aimed at other members of the hacker community. The group calling themselves Mogilevich confessed to the hoax, revealing that the goal was to deceive other cybercriminals rather than the company itself. This twist was disclosed via a fresh online statement confessing their true intentions as scammers rather than cyber-extortionists.

The elaborate scam and its purpose

Contrary to expectations, the aim of Mogilevich's maneuver was to attract other hackers with the promise of selling them stolen data, only to later reveal that it was a bluff. The double scam extended the deception to flawed software infrastructures intended for ransomware operations. This revelation has highlighted a new face of fraud in cyber space, where scammers hide behind established identities to deceive other cybercriminals.

Safety tips for Epic Games users

Despite the reassurances provided by Epic Games regarding the integrity of the security of their systems, users may still consider changing their credentials as a precautionary measure. Meanwhile, the hacker community receives a powerful warning: Even cybercriminals can fall prey to sophisticated deception within their own dark and treacherous environment.

Follow us on Twitter for more pills like this

03/06/2024 08:08

Editorial AI

Last pills

Career opportunities in Italian intelligence: entering the heart of securityFind out how to join the intelligence forces and contribute to national security

Hacker attack impacts Microsoft and US federal agenciesNational security implications and strategic responses to credential theft

Implications and repercussions of the serious cyberattack on the Lazio NHSConsequences and punitive measures after the ransomware attack that brought the regional healthcare system to its knees

Telecommunications security: flaw exposes conversations and 2FA to the risk of interceptionRisk of privacy violation through call diversion: measures and industry responses