Article Details
Scrape Timestamp (UTC): 2025-12-28 05:47:03.771
Original Article Text
Click to Toggle View
Massive Rainbow Six Siege breach gives players billions of credits. Ubisoft's Rainbow Six Siege (R6) suffered a breach that allowed hackers to abuse internal systems to ban and unban players, manipulate in-game moderation feeds, and grant massive amounts of in-game currency and cosmetic items to accounts worldwide. According to multiple player reports and in-game screenshots shared online, the attackers were able to: R6 Credits are a premium in-game currency sold for real money on Ubisoft's store. Based on Ubisoft's pricing, 15,000 R6 Credits cost $99.99, placing the value of 2 billion credits at roughly $13.33 million worth of in-game currency distributed for free. At 9:10 AM on Saturday, the official Rainbow Six Siege account on X confirmed the incident, stating that Ubisoft was aware of an issue affecting the game and that teams were working to resolve it. Shortly afterward, Ubisoft intentionally shut down Rainbow Six Siege and its in-game Marketplace, stating they were still working on the issue. "Siege and the Marketplace have been intentionally shut down while the team focuses on resolving the issue," reads a post on X. In a final update, Ubisoft clarified that players would not be punished for spending the granted credits, but that it would be rolling back all transactions made since 11:00 AM UTC. The company also stated that Ubisoft did not generate the messages seen in the ban ticker and that the ticker had been disabled previously. Ubisoft said it was continuing to work toward fully restoring the game, but the servers remain down at this time. At this time, Ubisoft has not released a formal statement regarding the incident and has not responded to emails from BleepingComputer requesting details on how the breach occurred. If you have any information regarding this incident or any other undisclosed attacks, you can contact us confidentially via Signal at 646-961-3731 or at tips@bleepingcomputer.com. Rumors of a larger breach Unverified claims state that a much larger breach occurred within Ubisoft's infrastructure. According to security research group VX-Underground, threat actors claimed to have breached Ubisoft's servers using a recently disclosed MongoDB vulnerability dubbed "MongoBleed." Tracked as CVE-2025-14847, the flaw allows unauthenticated remote attackers to leak the memory of exposed MongoDB instances, exposing credentials and authentication keys. A public PoC exploit has already been released that searches for secrets in exposed MongoDB servers. VX-Underground reports that multiple unrelated threat groups may have targeted Ubisoft: BleepingComputer has not been able to independently verify any of these claims, including whether MongoBleed was exploited, whether internal source code was accessed, or whether customer data was stolen. At this time, we only know that Ubisoft has confirmed the in-game abuse in Rainbow Six Siege, and there is no public evidence of a larger breach. BleepingComputer will update this story if Ubisoft provides additional details or if we learn more about these other claims. Break down IAM silos like Bitpanda, KnowBe4, and PathAI Broken IAM isn't just an IT problem - the impact ripples across your whole business. This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.
Daily Brief Summary
Ubisoft's Rainbow Six Siege experienced a breach, allowing attackers to manipulate in-game systems, including banning, unbanning, and distributing in-game currency and items.
The breach resulted in the unauthorized distribution of approximately 2 billion R6 Credits, valued at $13.33 million, significantly impacting the game's economy.
Ubisoft confirmed the incident via social media and temporarily shut down the game and its Marketplace to address the issue, aiming to restore normal operations.
Players who spent the granted credits will not face penalties, but Ubisoft plans to roll back all transactions made after the breach.
Unverified reports suggest the breach may have exploited a MongoDB vulnerability, CVE-2025-14847, though this remains unconfirmed by Ubisoft.
The incident raises concerns about potential larger breaches within Ubisoft's infrastructure, though no evidence of further exploitation or data theft has been confirmed.
Ubisoft's response includes disabling the ban ticker and working towards a full restoration of services, but further details on breach specifics remain undisclosed.