Recently, the global gaming and technology community has caused a security storm, caused by a hacker group called Mogilevich on the dark web who made a high-profile claim to have launched an attack on industry giant Epic Games and successfully obtained up to 189GB of sensitive "internal data". The hacking team claimed to have stolen a wide range of data, including key information such as user email addresses, passwords, real-name information, credit card details, and Epic Games' core software repositories**.
According to reports, the stolen data has appeared on dark web marketplaces for public sale. However, in the face of this horrific series of accusations, Epic Games appears calm and resolute. The company responded quickly on the X platform through official channels, emphasizing that its security team is conducting a comprehensive and in-depth investigation into the incident, and clarifying that so far, it has not found any evidence that the so-called internal data files are indeed on the dark web**, nor has it been able to confirm that its own servers have been actually compromised.
Still, the announcement of the hack has undoubtedly raised a serious security alert for Epic Games and hundreds of millions of users. The company reaffirmed its commitment to the security of user information and said it was closely monitoring all systems in case of an emergency. At the same time, Epic is urging all users to strengthen the security of their accounts, including changing their passwords regularly and enabling two-factor authentication.
This incident once again highlights the serious challenges faced by enterprises and personal information security in cyberspace, which not only requires enterprises to continuously improve their defense capabilities, but also requires the public and regulators to pay attention to cybersecurity issues and form a joint force to combat the increasingly rampant cybercrime. As the investigation deepens, how Epic Games will further respond to this crisis of confidence and whether it can prove the security of its systems will become the focus of close attention to the industry and users in the coming period.