ShinyHunters Claims Massive Rockstar Games Breach via Anodot-Snowflake Integration

The CyberSec Guru

Updated on:

Rockstar Games Breach

If you like this post, then please share it:

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Why your support matters: Zero paywalls: Keep the content 100% free for learners worldwide, Writeup Access: Get complete writeup access within 12 hours of machine drop along with scripts and commands.

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

What happened

ShinyHunters has added Rockstar Games to its dark web leak site. The attackers say they didn’t break into Rockstar or Snowflake directly. Instead, they went through Anodot, a SaaS cloud-cost monitoring tool Rockstar uses. From there, they pulled authentication tokens that let them walk into Rockstar’s Snowflake environment as if they were a legitimate internal service. They’ve set a ransom deadline of April 14. Pay or they release the data. This appears to be part of a broader wave hitting companies through Salesforce and Anodot integrations – Cisco and Telus have both been caught in it.

UPDATE: A Rockstar Games Spokesperson Has Confirmed the Breach

We can confirm that a limited amount of non-material company information was accessed in connection with a third-party data breach. This incident has no impact on our organization or our players.

Original Story Below

Rockstar Logo
Rockstar Logo

How it actually worked

Anodot is an AI analytics platform. Companies use it to track cloud costs and catch spending anomalies. To do that, it needs deep access to a company’s cloud infrastructure, in Rockstar’s case, their Snowflake data warehouse.

The attackers didn’t crack Snowflake’s encryption. They got into Anodot’s systems and pulled authentication tokens. These tokens are the digital equivalent of a pass key that lets one software talk to another without a human typing in a password each time. Because Rockstar’s Snowflake instance trusted those tokens, the attackers essentially walked in through the front door.

The scarier part: because the access looked like a legitimate internal monitoring process, Rockstar’s security team likely saw nothing unusual. ShinyHunters reportedly ran database exports for a while before anything was flagged.

Anodot Status Page
Anodot Status Page

Who are ShinyHunters?

They’ve been around since roughly 2020. They don’t go after individual users but target APIs, identity systems, and integrations, then sell or leak what they find. Past victims include Microsoft (a claimed 500GB source code theft in 2020), Wattpad (270 million user records), Cisco, AT&T, and Ticketmaster. They’re also linked to the Snowflake-related credential theft wave that caused problems throughout 2025.

They’re not amateurs. They know how to generate press coverage to increase pressure on targets.

ShinyHunters Rockstar
ShinyHunters Rockstar

Was Snowflake breached?

Almost certainly not. Snowflake’s platform did what it was supposed to – it let in someone with valid credentials. The problem is that those credentials were stolen from a third party Rockstar trusted.

This is the core issue: if you give a tool like Anodot broad read permissions on your Snowflake warehouse and that tool gets compromised, the data is gone. Snowflake isn’t the weak link here; the integration policy is.

Why Rockstar specifically?

GTA VI is arguably the most anticipated game release in years. That makes Rockstar’s internal data like source code, release schedules, platform agreements, revenue figures, player analytics genuinely valuable. In 2022, a teenager leaked early GTA VI footage through a Slack compromise. This is more methodical.

If ShinyHunters really has access to Rockstar’s Snowflake instances, the potential exposure includes financial records from GTA Online and Red Dead Online, player spending and geographic data, marketing timelines, and contracts with Sony, Microsoft, voice actors, and music labels.

As of writing, Rockstar and Take-Two have not commented. That’s typical for them.

Rockstar isn’t alone

ShinyHunters recently claimed data from over 400 companies linked to Salesforce integrations. Other named victims in this wave include Cisco, Canadian telecom Telus, Dutch provider Odido, and hints at European Commission data in various forum posts. One compromised tool, a lot of downstream damage.

What companies should actually do

Token rotation. Tokens that don’t expire for years are a liability – automated rotation means a stolen token becomes useless fast. Least privilege access – did Anodot need access to all of Rockstar’s Snowflake data? Probably not and limiting that scope limits the blast radius. Egress monitoring – watching who comes in matters, but watching what goes out matters more. A sudden multi-terabyte transfer to an unknown IP should shut the connection down automatically. And where possible, MFA even for service accounts.

If player data gets leaked before the April 14 deadline, Rockstar faces GDPR and CCPA disclosure obligations, potential FTC scrutiny, class action exposure, and the kind of trust damage that’s hard to recover from when you’re two steps from a major game launch.

On your GTA Online account

There’s no evidence so far that individual player passwords or payment details were accessed. The breach appears to target corporate data. Still, if you haven’t enabled 2FA on your Rockstar Social Club account, now’s a reasonable time to do it.

One final note

This isn’t a story about a firewall failure or a weak password. The entry point was an authentication token sitting inside a third-party analytics tool that a major game studio trusted with broad access to its data. That’s where the exposure was, and it’s the kind of thing most companies still aren’t watching closely enough.

Disclaimer: This report is based on claims by threat actors and ongoing investigations. Rockstar Games has not confirmed the scope of any breach.

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Your contribution powers free tutorials, hands-on labs, and security resources.

Why your support matters:
  • Writeup Access: Get complete writeup access within 24 hours
  • Zero paywalls: Keep the content 100% free for learners worldwide

Perks for one-time supporters:
☕️ $5: Shoutout in Buy Me a Coffee
🛡️ $8: Fast-track Access to Live Webinars
💻 $10: Vote on future tutorial topics + exclusive AMA access

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

If you like this post, then please share it:

News

Discover more from The CyberSec Guru

Subscribe to get the latest posts sent to your email!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from The CyberSec Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading