Ubisoft Confirms Rainbow Six Siege Server Intrusion Linked to MongoBleed

Ubisoft Confirms Rainbow Six Siege Server Intrusion Linked to MongoBleed

Ubisoft faced a coordinated security crisis today as hackers exploited the critical MongoBleed vulnerability (CVE-2025-14847) to infiltrate Rainbow Six Siege servers, causing widespread account tampering and service disruptions.

In-Game Chaos Unfolds

According to CSN, Players worldwide reported extraordinary account modifications beginning early this morning.

Thousands of gamers discovered their accounts credited with millions of R6 Credits and Renown, while exclusive skins and items normally locked behind paywalls were unlocked for random users.

The economic disruption totaled approximately $339.96 trillion in fabricated in-game currency.

The attackers escalated their assault by weaponizing the game’s anti-cheat ban system, targeting high-profile accounts including official Ubisoft administrators and popular streamers.

Screenshots circulating on social media reveal attackers using the ban notification feed as a communication channel, spelling out cryptic messages through sequential bot account bans: “What else are they hiding from us?”

MongoBleed Connection Confirmed

Security analysis confirms the intrusion traces to the MongoBleed vulnerability, which allows attackers to read server memory without authentication by sending malformed compressed packets.

This flaw enabled threat actors to bypass security controls and gain administrative access to critical game infrastructure.

According to vx-underground intelligence, the First Group orchestrated today’s visible attack, while a separate threat actor the Second Group leveraged the same MongoDB flaw to exfiltrate approximately 900GB of sensitive data.

This cache includes source code, software development kits (SDKs), and multiplayer infrastructure code spanning from the 1990s to present day.

The breach represents a catastrophic intellectual property loss that could fuel cheat development and enable reverse engineering of Ubisoft’s game engines for years.

A third threat actor also claimed unauthorized access to user databases and attempted extortion via Telegram.

Ubisoft has issued an official statement confirming the breach while servers remain offline for unannounced maintenance.

Security experts recommend players avoid logging into Ubisoft Connect until the publisher verifies server integrity.

The publisher plans a comprehensive data rollback to restore player accounts to their pre-incident state a move expected to frustrate legitimate weekend progression but necessary to mitigate economic damage.

This incident underscores the critical importance of patching high-severity database vulnerabilities immediately.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.





Source link