Gaming gear manufacturer Razer has experienced a significant data breach, as a hacker claims to have gained access to critical information such as encryption keys, source code, database, and backend logins. The breach came to light when the hacker posted about it on a hackers’ forum, offering the stolen data for sale. The compromised information reportedly includes a list of 404,000 email addresses, which the hacker provided as evidence of the breach.
Razer responded promptly to the reports, stating that they are actively investigating the potential breach. However, the company did not immediately respond to inquiries from Cointelegraph regarding the incident. Website BleepingComputer independently confirmed the validity of the exposed email addresses and reported that Razer has taken action by resetting all user accounts and urging users to change their passwords.
This recent hack adds to Razer’s cybersecurity challenges, as the company is still grappling with the aftermath of a previous data leak that occurred in 2020. In that incident, personal details of approximately 100,000 users were compromised due to a vulnerability in a line of code introduced by an IT vendor, Capgemini. The breach occurred between June and September 2020, and the compromised data was discovered by a security consultant in September of that year.
Razer, founded in 2005, is a prominent gaming hardware manufacturer with offices in Singapore and the United States. In 2017, the company introduced virtual currencies for rewards and credits, expanding its offering in the subsequent year to include mining capabilities. Some of the data reportedly stolen in the recent hack pertains to the older version of Razer’s system.
As Razer deals with both the ongoing investigation into the latest breach and the repercussions of the 2020 data leak, it faces significant challenges in safeguarding user information and maintaining trust in its products and services. Cybersecurity remains a critical concern for gaming companies like Razer, highlighting the need for robust measures to protect sensitive data from malicious actors.