URGENT WARNING: NEW BREACH CONFIRMED. DO NOT LOG IN. DISCONNECT ACCOUNTS.
BREAKING: JANUARY 5TH “RE-HACK”
UPDATE [18:30 UTC]: SERVERS DOWN. IT’S HAPPENING AGAIN.
Just days after the “MongoBleed” recovery, Rainbow Six Siege has been breached again.
Reports are flooding in from thousands of users that the game client has been compromised for a second time. Ubisoft has initiated an emergency server shutdown effectively immediately.

(previous) OFFICIAL UPDATE: SERVERS OPEN TO ALL
UPDATE [2:55 UTC]: RECOVERY PHASE INITIATED
Ubisoft has officially confirmed that live tests are complete and the game is now open to all players. However, as the massive “MongoBleed” crisis transitions into a recovery phase, players are warned that stability is not yet guaranteed.
OFFICIAL STATEMENT:
- ➡️ LIVE TESTS COMPLETE
We are opening the game to all players. Please note that you may experience a queue when connecting, as our services ramp up. - ➡️ ROLLBACK STATUS: COMPLETE
If you DID NOT log in between December 27th 10:49 UTC and December 29th: You should see NO CHANGES to your inventory.
If you DID connect after December 27th 10:49 UTC: A small percentage of players may temporarily lose access to some owned items. Investigations and corrections will continue over the next two weeks. - ➡️ MARKETPLACE STATUS
The Marketplace will remain CLOSED until further notice as investigations continue.
🚨 INTELLIGENCE UPDATE: THE “5 FACTIONS”
LATEST DEVELOPMENTS: The “Civil War” narrative has expanded. A fifth, highly sophisticated group has emerged, providing a comprehensive technical breakdown that exposes the lies of the others.
THE REALITY: With the exception of Group 3 (The Fakes), Groups 1, 2, 4, and 5 reportedly know each other. They operate loosely together as a “hardcore community” of gaming nerds, reverse engineers, and exploit developers.
FACTION 1: THE “ROBIN HOODS” (GAME BREAKERS)
- Role: The Chaos Agents.
- Status: LAYING LOW.
- The Act: Responsible for the initial incident, gifting ~$339,000,000,000,000 worth of in-game currency.
- Current State: They caused the chaos that started the weekend and have since gone quiet to watch the fallout.
FACTION 2: THE “ARCHITECTS” (THE LIARS)
- Role: The Source Code Thieves.
- Status: EXPOSED.
- The Truth: They DO possess internal Ubisoft assets/source code.
- The Lie: Their claim that they obtained this data via “MongoBleed” has been PROVEN FALSE.
- The Reality: They lied about how they achieved the breach. Group 5 has exposed their actual methods, confirming they are holding real data but lying about the vector to confuse security teams.
FACTION 3: THE “EXTORTIONISTS” (THE FAKES)
- Role: The Scammers.
- Status: IRRELEVANT / ISOLATED.
- The Scam: Operating on Telegram, claiming to have compromised Ubisoft customer data.
- The Reality: THEY ARE LYING. They have no connection to the other groups and no valid data. They are using fake datasets to intimidate Ubisoft and customers into paying ransoms.
FACTION 4: THE “WHISTLEBLOWERS” (THE CRITICS)
- Role: The Commentators.
- Status: CRITICAL OF GROUP 2.
- The Stance: They openly call Group 2 “liars” and accuse them of trying to “bamboozle” Group 1. They seem to exist to check the egos of the other factions.
FACTION 5: THE “APEX” (THE REVERSE ENGINEERS)
- Role: The Technicians / The “Hardcore” Elite.
- Status: DOMINANT & CALCULATED.
- The Entry: Appeared today with a “big swinging dick” approach—no memes, just hard evidence.
- The Breakdown: Presented a comprehensive, step-by-step technical breakdown of the entire conflict.
- Exposed Group 2: Unveiled exactly how Group 2 gained access to Ubisoft internals, backed by photographic evidence.
- Exposed Group 1: Provided code demonstrating how Group 1 executed the currency exploits and other unreported hacks.
- Identity: Believed to be highly talented reverse engineers, likely creators of high-end cheats for Ubisoft titles. They are intelligent, calculated, and not “messing around.”
- Ubisoft’s Knowledge: Group 5 has also detailed exactly how Ubisoft is tracking these events. Ubisoft is reportedly aware of Groups 1, 2, 4, and 5.
- Future Plans: Group 5 has promised a public technical write-up at a later date, currently delayed due to internal friction between Group 1 and Group 2.
INSIDER THREATS & BILLION-DOLLAR LIES
UPDATE [22:15 EST]: HELPDESK BRIBERY SCANDAL EXPOSED
The situation at Ubisoft has shifted from a technical breach into a bizarre psychological “Civil War” between hacker factions, compounded by a massive internal security failure. Intelligence gathered from the “internet streets” indicates that narratives are collapsing, lies are being exposed, and the integrity of Ubisoft’s own support staff is now in question.
NEW: INSIDER THREATS – THE HELPDESK BRIBERY SCANDAL
LOCATION: ALLEGEDLY OUTSOURCED SUPPORT (INDIA) THREAT: CASH FOR “PANEL ACCESS”

While hackers fight over who stole what, a far more concerning reality has emerged regarding how access is being maintained.
- The Allegation: Credible reports suggest that Ubisoft’s outsourced helpdesk support (allegedly based in India) has been compromised by insider threats.
- The Scheme: Support staff are allegedly accepting bribes in exchange for granting “Panel Access” to unauthorized users.
- The Consequence: This “Panel Access” effectively hands over administrative keys to the kingdom. It allows individuals who pay the bribe to bypass security protocols, potentially banning/unbanning accounts, viewing sensitive ticket history, or facilitating account takeovers from the inside.
- The Reality: This implies that the breach is not just a technical failure of code (like MongoBleed), but a human failure of corruption. A multi-billion dollar company is reportedly being dismantled because low-level support staff are selling access to the highest bidder.
THE “$340 TRILLION DOLLAR” NIGHTMARE
UPDATE [17:30 UTC]: ROLLBACK CURRENTLY ONGOING
Ubisoft has confirmed officially that rollback is ongoing. To quote them:
A rollback is currently ongoing and afterwards, extensive quality control tests will be executed to ensure the integrity of accounts and effectiveness of changes. The team is focused on getting players back into the game as quickly as possible. Please know that this matter is being handled with extreme care and therefore, timing cannot be guaranteed. We will provide another update as soon as we know more.
Thank you all for your patience and understanding as we continue to tackle this.
@Rainbow6Game
UPDATE [14:30 UTC]: THE “FOG OF WAR” DESCENDS

This is no longer just a “glitch.” It is a coordinated dismantling of Ubisoft’s digital infrastructure.
FACTION 1: THE “ROBIN HOODS” (GAME BREAKERS)
STATUS: LAYING LOW CONFIRMED DAMAGE: ~$339,000,000,000,000 IN In-GAME CURRENCY
The group responsible for the initial chaos has gone silent.
- The Heist: It is now confirmed that this group gifted approximately $339,000,000,000,000 (Three Hundred Thirty-Nine Trillion Dollars) worth of in-game currency to the player base.
- Current State: Unlike the other groups clamoring for attention, the “Robin Hoods” have effectively vanished. They dropped the money, broke the economy, and are now “laying low,” likely watching the fallout from the shadows.
- Impact: They remain the only group with a verifiable, tangible impact on the game’s live environment.
FACTION 2: THE “ARCHITECTS” (THE LIARS?)
STATUS: CONFLICTED & EXAGGERATING CLAIM: “ALL SOURCE CODE” (DISPUTED)
The narrative surrounding the second group—who allegedly stole 900GB of data—is crumbling.
- The Conflict: This group has been engaged in heated arguments with random users on the internet, damaging their credibility.
- The Lie: Initially, reports suggested they compromised an internal Git repository via “MongoBleed” to steal everything. This is now believed to be a LIE or a massive exaggeration.
- The Reality: New intelligence suggests they DO NOT have the volume of material they claimed. While they may have accessed some systems, the “total compromise” narrative appears to be a bluff designed to inflate their importance.
FACTION 3: THE “EXTORTIONISTS” (THE FAKES)
STATUS: EXPOSED AS LIARS CLAIM: “CUSTOMER DATA” (FALSE)
The third group, previously feared to have stolen user data, has been exposed.
- The Verdict: THEY ARE LYING.
- Data Safety: To the best of current knowledge, they did NOT compromise Ubisoft customer data.
- The Motive: Their goal appears to be pure intimidation. They are attempting to scare Ubisoft employees and the public without any actual leverage. Their demands are baseless threats from a group with empty hands.
FACTION 4: THE “WHISTLEBLOWERS” (THE CRITICS)
STATUS: LAYING LOW / CRITICAL OF GROUP 2
A fourth group has emerged primarily to critique the others.
- The Stance: They are also “laying low” but have been vocal in asserting that Group 2 are “a bunch of jerks.”
- The Theory: Group 4 believes Group 2 has actually possessed some Ubisoft source code “for a while” (long before this weekend).
- The Frame Job: Their theory is that Group 2 is trying to hide behind Group 1. By timing their leak with Group 1’s currency hack, Group 2 is attempting to “frame” the chaos on the current event, masking the fact that they likely stole the data months ago.
NEW THREAT: THE “IMPOSTERS”
STATUS: CHAOTIC COPYCATS
Adding to the confusion, a wave of “Imposter Group Twos” has flooded the internet.
- The Tactic: Random individuals are now impersonating the “Extortionists” (Group 2) on social media and forums.
- The Motive: Unknown. These individuals are lying and pretending to be criminal hackers for reasons that defy logic—likely seeking internet clout or attempting to ride the wave of panic.
- Result: This has made verifying actual threats nearly impossible, as the “real” hackers are now drowning in a sea of fakes.
THE “MONGOBLEED” CATASTROPHE
The situation has escalated from a game exploit to one of the largest data breaches in gaming history. We can now confirm the root cause of the chaos engulfing Rainbow Six Siege is not a simple game bug, but a massive infrastructure breach known as “MongoBleed.”
According to verified reports and insider leaks, Ubisoft’s MongoDB servers were left exposed, allowing unknown Threat Actors to exfiltrate a staggering amount of proprietary data.
The Scale of the Leak:
- Source Code Exfiltrated: Hackers have reportedly obtained the source code for “basically every single Ubisoft product dating back to the 90s.”
- Critical Infrastructure: The leak includes Software Development Kits (SDKs), proprietary Middleware, uPlay (Ubisoft Connect) source code, and RDV (Rendez-Vous)—the core matchmaking and networking architecture for Ubisoft games.
- The “Joyride”: With full administrative access and source code in hand, the attackers are effectively “taking a joyride” through Ubisoft’s live services, granting themselves god-like powers to ban devs, generate infinite currency, and crash lobbies at will.
TECHNICAL BREAKDOWN: WHAT IS “MONGOBLEED”?
To understand how they stole the source code, we must understand the tool they used. MongoBleed is a critical vulnerability affecting MongoDB databases (similar in severity to the infamous “Heartbleed” bug).
- The Flaw: It allows unauthenticated attackers to read the memory of the database server.
- The Pivot: By “bleeding” the memory, the attackers likely recovered valid credentials (passwords or API tokens) that were temporarily stored in the system’s RAM.
- The Result: Using these stolen credentials, they bypassed the firewall and logged directly into Ubisoft’s internal Git repositories as if they were senior developers, allowing them to download terabytes of source code undetected.
ALSO READ: MongoBleed: The “Christmas Exploit” That Left Thousands of Databases Exposed (CVE-2025-14847)
CRITICAL SECURITY NOTE: IS YOUR DATA SAFE?
Despite the apocalyptic nature of the source code leak, there is one silver lining for the millions of panic-stricken users.
NO CUSTOMER DATA WAS STOLEN.
Based on the latest intelligence regarding this specific series of compromises, the Threat Actors responsible have not targeted user Personal Identifiable Information (PII). Credit card numbers, passwords, and personal addresses appear to be safe. The attackers seem focused solely on humiliating Ubisoft and dismantling the game environments, rather than identity theft.
However, as a precaution, we still recommend enabling 2FA once servers stabilize.

UBISOFT PULLS THE PLUG
The worst-case scenario has been confirmed. Ubisoft has officially taken the Rainbow Six Siege servers completely offline. This is not a standard maintenance rotation.
As of 5:20 PM UTC, players worldwide were forcibly disconnected from matches. The Ubisoft Connect launcher now displays a critical “Maintenance” banner, and all login attempts are being blocked at the authentication gateway.
This “Cold Shutdown” indicates that the breach was active and spreading. By severing the connection, Ubisoft is attempting to “freeze” the database to prevent further corruption, but for millions of players, the question remains: Is the damage already done?
THE “COLD BACKUP” PROTOCOL
LATEST STATUS: SERVERS REMAIN OFFLINE – ETA UNKNOWN

Ubisoft has moved into a disaster recovery phase. Following the total server blackout initiated earlier today, insider sources and updated support messages confirm that Ubisoft is currently attempting to restore the entire player database from a previous backup.
Engineers are working to locate a “clean snapshot” of the servers taken before the breach began (estimated to be from 24 to 48 hours ago). This is a nuclear option, confirming that the live data was too corrupted by the hack and the infinite currency glitch to be salvaged manually.
CRITICAL NOTE: There is currently NO ESTIMATED TIME OF ARRIVAL (ETA) for the servers to come back online. Due to the size of the player database (millions of accounts) and the need to verify the integrity of the backup, the game could remain unplayable for the rest of the day, or potentially into tomorrow.
OFFICIAL UBISOFT UPDATE: ROLLBACK & “FAKE” BANS
LATEST STATEMENT [20:25 UTC]: ROLLBACK INITIATED
Ubisoft has just released a critical communique addressing the biggest fears of the community: account bans and the rollback timeline.
1. NO BANS FOR SPENDING CREDITS
Contrary to earlier fears, Ubisoft has explicitly stated:
“Nobody will be banned for spending credits received.”
This is a massive relief for players who panic-bought items. However, do not get too attached to those skins—they will be removed during the rollback.
2. THE ROLLBACK TIMELINE
The “Database Reset” has a specific target time.
“A rollback of all transactions that occurred since 11 AM (UTC time) is underway.”
Any progress, rank changes, or purchases made after 11:00 AM UTC will be erased.
3. THE “FAKE” BAN TICKER
The terrifying messages seen in the top-right corner of the screen banning famous streamers and devs were fabricated by the hackers.
“The ban ticker was turned off in a past update. Any messages seen were not triggered by us.”
The hackers (Group 1) re-enabled or mimicked this UI element to spread fear.
4. SHIELDGUARD CONFUSION
To make matters more confusing, a real ban wave did happen simultaneously.
“An official R6 ShieldGuard ban wave did occur but is not related to this incident.”
If you were banned by BattlEye/ShieldGuard today, it might be a legitimate ban unrelated to the breach.
THE SIEGE ECONOMY HAS COLLAPSED: WHAT WE KNOW SO FAR
In what is rapidly shaping up to be the most catastrophic security breach in the ten-year history of Tom Clancy’s Rainbow Six Siege, reports are flooding in from every corner of the globe confirming a total compromise of Ubisoft’s live-service infrastructure.
As of approximately 10:00 UTC today, he Rainbow Six Siege ecosystem descended into chaos. What began as scattered reports of connectivity issues has snowballed into a verified, widespread crisis involving the injection of millions of dollars’ worth of R6 Credits, Renown, and exclusive Alpha Packs into random player accounts, followed immediately by a draconian “ban wave” that appears to be targeting innocent players, professional streamers, and even Ubisoft developers themselves.

THE “ROBIN HOOD” GLITCH: INFINITE CURRENCY
TThe first sign of the breach was unprecedented. Unlike typical server outages where data is lost, this breach appears to be generating data. Thousands of players logging in to check the daily “10 Years of Siege” anniversary rewards were greeted not with a single cosmetic, but with account balances that defy the game’s logic.
- R6 Credits: Users are reporting balances jumping from near-zero to over 500,000 instantly upon login.
- Alpha Packs: Inventories are flooding with thousands of Alpha and Bravo packs.
- Elite Skins: Reports confirm that the entire store catalog is unlocking automatically for affected users without transaction history.
“I logged in to play a quick match of Standard and saw I had 2 million Renown,” said one Reddit user in a thread that has since been locked by moderators. “I didn’t do anything. I didn’t buy anything. It just appeared.”
THE “PURGE”: FALSE BANS AND DEVELOPER ACCOUNTS HIT
The situation took a darker turn within the hour. Following the injection of items, Ubisoft’s automated anti-cheat systems (BattlEye and FairFight) appear to have gone nuclear. Triggered by the sudden, impossible anomalies in player inventories, the systems began issuing permanent bans to anyone affected by the breach.
But it’s not just random players. High-profile figures in the community are being struck down:
- Jynxzi: The biggest streamer in the category has reportedly lost access to his main account amidst the chaos, following a week of security concerns regarding social engineering.
- Spoit: Pro players are tweeting screenshots of “Cheating” bans on their verified accounts, despite being mid-stream or offline entirely.
- Official Ubisoft Accounts: In a twist that suggests deep-level server access, even accounts flagged as ‘Developer’ or ‘Admin’ in-game have been spotted with “Banned for Toxic Behavior” tags in public lobbies.


TECHNICAL ANALYSIS: HOW DID THIS HAPPEN?
Cybersecurity analysts and data miners within the Siege community are speculating that this is not a simple DDoS attack, but a Remote Code Execution (RCE) or a Database Injection attack directly targeting the player profile servers.
Theory 1: The “Christmas Gift” Backdoor
The current “10 Years of Siege” event involves daily login rewards. It is highly probable that the API endpoint responsible for granting these daily items was compromised. Attackers may have modified the payload of the daily reward request. Instead of sending {item_id: charm_01}, the compromised server is sending {currency_r6_credits: 999999}. Because the command is coming from the trusted reward server, the main game database accepts it as legitimate, triggering the items.
Theory 2: Admin Compromised
The random banning of official accounts suggests the attackers have gained access to a “Game Master” or internal admin panel. The messages appearing in the ban feeds—some users reported ban reasons spelling out song lyrics or “Happy Holidays”—indicate human interference rather than just a malfunctioning bot. This mirrors the chaotic “Titanfall 2” hacks of previous years, where attackers held the game hostage for notoriety.

THE FALLOUT: MARKETPLACE OFFLINE & ECONOMY WIPED
The repercussions of this breach have already forced Ubisoft’s hand in unprecedented ways.
R6 Siege Marketplace Shutdown
As of 14:00 UTC, the Rainbow Six Siege Marketplace (Beta) is officially OFFLINE. Users attempting to access the trading site are met with a “Maintenance” splash screen.

This is a critical containment measure. With millions of illegitimate R6 Credits flooding the system, leaving the Marketplace open would allow hackers and unwitting beneficiaries to “wash” the stolen currency by buying up every available Glacier and Gold Dust skin. This would permanently ruin the game’s economy by distributing the hacked credits to legitimate sellers, making a rollback significantly more complex.
If these reports are verified, the Rainbow Six Siege economy is effectively dead.
- Inflation of Rarity: If everyone has the Glaz Black Ice or the Master Chief Elite skin, they lose all scarcity value.
- Marketplace Crash: The R6 Siege Marketplace, currently in beta, relies on scarcity to dictate prices. If millions of credits are injected, prices will hyper-inflate to millions of credits per item, or crash to zero, rendering the trading system useless.
- Rollbacks are Inevitable: Ubisoft will have no choice but to perform a “Database Rollback.” This means rewinding the servers to a state before the breach occurred (likely 24-48 hours ago). WARNING: Any legitimate progress, rank gains, or Battle Pass levels achieved in the last 24 hours will likely be erased.
HISTORICAL CONTEXT: ECHOES OF TITANFALL & APEX LEGENDS
Veterans of the FPS genre are drawing chilling parallels to the “SaveTitanfall” hack of 2021 and the 2024 ALGS Apex Legends hack.
- The Apex Comparison: During the 2024 ALGS finals, pro players like Genburten were hacked mid-game, given aimbot, and forced to quit. That was an RCE exploit. The fact that Rainbow Six Siege accounts are being banned via administrative messages suggests a similar level of intrusion—someone has the “keys to the kingdom.”
- The “Destroyer2009” Factor: Rumors are circulating on dark web forums that this attack may be the work of notorious game breakers who target older engines. With Siege running on the decade-old AnvilNext 2.0 engine, legacy code vulnerabilities are a prime target.
WHAT YOU MUST DO RIGHT NOW
1. DO NOT LOG IN Logging in connects your client to the compromised servers. If the exploit is script-based and triggers upon handshake, simply logging in could flag your account with millions of illegal credits, triggering an automated permanent ban.
2. DO NOT SPEND THE CREDITS If you are already logged in and see the credits, DO NOT SPEND THEM. Spending verified “hacked” currency is often the difference between a ban appeal being accepted or rejected. If you buy skins with stolen credits, you are complicating your account’s history.
3. ENABLE 2FA (BUT DON’T RELY ON IT) While this appears to be a server-side breach, it is always a good time to ensure your Two-Factor Authentication is active. However, note that 2FA protects your password, not your server data. If the server itself is telling the system you have credits, 2FA cannot stop it.
4. REVOKE THIRD-PARTY ACCESS Go to your Ubisoft Account Management page and unlink any suspicious third-party apps or trackers until the situation resolves.
5. IGNORE threats regarding your personal data (Group 3 is lying).
6. IGNORE “Hackers” on Twitter claiming they will delete your account (Likely Imposters).
7. WAIT for the official rollback to wipe the illicit credits.
COMMUNITY REACTION: “DEAD GAME” OR “FREE STUFF”?
Social media is currently split between panic and greed.
Twitter/X is trending with #R6Breach and #UbisoftDown. Players are sharing memes of becoming overnight millionaires in-game, while others are furious about losing their decade-old accounts to false bans.
Reddit threads are being locked as fast as they are posted to prevent the spread of exploit tutorials. The top comment on the main megathread reads: “I’ve played this game for 10 years, survived the cheater metas, the invisible glitches, and the content droughts. But if they roll back my Rank because their servers got fried, I’m done.”
Discord communities are in full lockdown, with major community servers disabling image uploads to prevent the spread of ban screenshots and hacked lobbies.
UBISOFT’S RESPONSE (OR LACK THEREOF)
As of this writing, the official @Rainbow6Game twitter account is silent. The @UbisoftSupport account is replying to individual users with generic “connectivity troubleshooting” steps, suggesting that the Tier 1 support team has not yet been briefed on the magnitude of the breach.
However, insider sources suggest that Ubisoft Montreal has initiated an emergency “Code Red” meeting. It is expected that the servers will be taken offline entirely—not just for maintenance, but a full “pull the plug” shutdown—within the next hour to stop the bleeding.
UPDATE: Ubisoft has acknowledged the breach.
For hours, the community was left in the dark, fueling panic on social media. However, shortly after the chaos began, the official Rainbow Six Siege account on X (formerly Twitter) broke its silence with a brief, grim confirmation of the events.
At 2:10 PM UTC, @Rainbow6Game posted:
“We’re aware of an incident currently affecting Rainbow Six Siege. Our teams are working on a resolution.
We will share further updates once available.”
This terse statement confirms two things:
- It is an “Incident”: They are avoiding the word “Hack” or “Breach” for legal reasons, but the acknowledgment validates the severity.
- No ETA: The lack of a “scheduled maintenance” timeframe suggests the team is still diagnosing the entry point of the exploit.

Insider sources suggest that Ubisoft Montreal has initiated an emergency “Code Red” meeting. It is expected that the servers will be taken offline entirely—not just for maintenance, but a full “pull the plug” shutdown—within the next hour to stop the bleeding.
THE ROLLBACK NIGHTMARE: WHAT HAPPENS NEXT?
The technical challenge facing Ubisoft in the coming days is monumental. A simple “rollback” isn’t simple when real money is involved.
- The Transaction Problem: If Player A bought legitimate Credits with real money at 1:00 PM, and Player B received hacked Credits at 1:15 PM, rolling the server back to 12:00 PM wipes Player A’s legitimate purchase. Ubisoft will have to manually reconcile millions of transaction logs with payment processors (Sony, Microsoft, Steam) to ensure paying customers aren’t robbed by the fix.
- The “Six Invitational” Threat: With the biggest esports event of the year, the Six Invitational, just weeks away, pro teams are unable to practice (scrim). If the servers remain unstable or if pro accounts remain falsely banned for days, it could jeopardize the integrity of the multi-million dollar tournament.
DEVELOPING STORY
This is a fluid situation. The breach of a AAA live-service game of this magnitude is rare and catastrophic. The combination of infinite premium currency and administrative command abuse points to a severe vulnerability that could take days, not hours, to fix.
We will update this article as more information becomes available








