Rockstar Games data breach via stolen Snowflake tokens from an Anodot incident; ShinyHunters extortion gang leaks 78.6 million records. Tokens used to access Snowflake, S3, and Kinesis. No impact on player data but exposed analytics and support info.
| IOC Type | Value | Description | Relevant MITRE ATT&CK Techniques |
|---|---|---|---|
| Domain |
anodot.com
|
Anodot, the anomaly detection company whose breach provided stolen tokens. | T1078.004|T1048 |
| Domain |
shinyhunters.extortion.site
|
Data leak site where stolen Rockstar Games data is displayed. | T1048|T1078 |
| Domain |
snowflakecomputing.com
|
Snowflake cloud data warehouse platform accessed using stolen tokens. | T1078.004|T1133 |
| Code | Title |
|---|---|
| T1078.003 | Account Manipulation – external shared account (Snowflake) accessed with stolen tokens |
| T1566.001 | Phishing: Spearphishing Attachment - Phishing – initial compromise inferred via Anodot security incident |
| T1078.004 | Cloud Account – compromised Snowflake account |
| T1048 | Exfiltration Over Web Services – data posted to extortion site |
| T1078 | Valid Accounts – use of stolen credentials for cloud services |
| T1041 | Exfiltration Over C2 Channel – off‑site data transfer via internet |
| T1105 | Ingress Tool Transfer - Ingress Tool Transfer – potential upload of stolen data to extortion site |
| T1133 | External Remote Services – access to Snowflake and S3 |
| T1059.001 | Command and Scripting Interpet: PowerShell - Command Shell – commands to transfer data |
| T1140 | Deobfuscate/Decode Files or Information – revealing analytics data |
| Type | Value |
|---|---|
| Company | Rockstar Games |
As first reported by BleepingComputer, the threat actors stole authentication tokens from the service and used them to access customer data stored in connected Snowflake, S3, and Amazon Kinesis instances. Snowflake confirmed to BleepingComputer last week that it had detected unusual activity affecting a small number of customer accounts tied to a third-party integration, and responded by locking down the affected accounts and notifying customers. The company later confirmed that the third-party integration company was Anodot. The ShinyHunters group told BleepingComputer it was behind the attacks and claimed to have stolen data from dozens of companies using the compromised tokens.