p
According to VX Underground, Arkat_001 got access to Riot’s database via a SMS sent to an employee, which they were then able to escalate and obtain security credentials of a company director at Riot Games. Arkat_001’s original objective was to gain access to the source code for Vanguard, Riot’s anti-cheat software for their FPS game Valorant, which has been notoriously hard to develop cheats for due to the software functioning like a rootkit (having access to system files before the operating system loads).
After Arkat_001 failed to gain access to Vanguard source code because they were kicked from the network before discovering the files. Riot Games Security Operations Center (SOC) responded to the intrusion within 36 hours, with several outside security experts and hackers saying this is an extremely quick response time. This may be due to Riot having specific JSON files which keep track of intrusions based on specific areas in their offices, which is connected to their Intrusion Detection System (IDS).
Despite Riot’s statement saying the hacker(s) had not obtained access to player data, Arkat_001 has stated that they had access to player-sensitive data such as email addresses as well as access to an admin console with the ability to send RP to users.
Esports Heaven spoke with the hacker(s) and could not confirm whether it was a single individual or a group, although Arkat_001 admitted they infiltrated Riot independently, Arkat_001 also continued to use “we” as if they were affiliated with others. Arkat_001 also confirmed that they were not part of the infamous hacking group Roasted 0ktapus (also believed to be the hacker group Scattered Spider) which is responsible for other gaming and tech data breaches. Arkat_001 also confirmed that they had not used IceBreaker, a new social engineering technique that has been ravaging the gaming/gambling industry. Arkat_001 claims that they used no malware or files to get access to Riot’s database.
Esports Heaven reached out for comment to Riot Games but did not receive a response.