找回密码
 立即注册
搜索
查看: 3745|回复: 13

[新闻] TLOU2泄露的实际原因

[复制链接]
     
发表于 2020-5-3 19:12 | 显示全部楼层 |阅读模式
有hacker找到了顽皮狗过去游戏的安全漏洞,搞进了ND的服务器

最近主机战争打得火热,前一阵儿又有Jason那篇文章,有心人士给这事儿加了很多抓马

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有账号?立即注册

×
回复

使用道具 举报

     
发表于 2020-5-3 19:15 | 显示全部楼层
居然不是办公室政治
回复

使用道具 举报

头像被屏蔽
     
发表于 2020-5-3 19:17 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
回复

使用道具 举报

     
发表于 2020-5-3 19:19 | 显示全部楼层
能下定论了吗我听好多个版本了

  -- 来自 能看大图的 Stage1官方 Android客户端
回复

使用道具 举报

     
发表于 2020-5-3 19:22 来自手机 | 显示全部楼层
评论往往与质询同时出现,虚构的事实通常由于符合人们的期待而被当作真相。
——李普曼,1922
回复

使用道具 举报

     
 楼主| 发表于 2020-5-3 19:30 来自手机 | 显示全部楼层
Kidinthe21st 发表于 2020-5-3 19:19
能下定论了吗我听好多个版本了

  -- 来自 能看大图的 Stage1官方 Android客户端 ...

这个是Jason本人确认的,你可以自己考量
这边还有一个详细版:https://mobile.twitter.com/PixelButts/status/1256792950136172550
Every ND game has a "final" patch that is pushed to the game that contains an Amazon AWS key, that when paired with a secret bucket ID it will give full access to the server's contents.
Theres a different key and bucket ID per game, this is important
This vulnerability was discovered recently and some hackers took full advantage of it, saving TLOU1, UC3, and other dev stuff.
At the time, it was disclosed to me around early February, and was very early on so ~January 2020 it was discovered
Come March, keys and data was saved, somewhere around 1-3TB, though I can only say 1TB for sure.
They were trying to dump TLOU1 in an effort to get that games key as UC3 had TLOU1 material, so surely TLOU1 had TLOU2? No idea in the end but come April things got spicy

In April all the leaks of story were validated by the footage posted. I cannot speak for the text posts with story, but I can say that the dates from discovery and disclosure match with timestamps in the footage as well.
You can check yourself, bottom left of all footage
Come may 30th, late at night, the source that disclosed this to me stated that the key had changed so ND for sure knew how to resolve this issue, and no keys work with the bucket IDs now.
This is good but theres more
The individual that spoke to me is a direct source of this compromise, but is NOT (as far as I am aware, or can tell) not the one that leaked this material. I say this because even they were weirdly skeptical about the "ND employee leaked things because they were mad"
I've been watching this for about 3 months now, and after speaking to a first hand source of this, my only conclusion is they (and their immediate circle) did not leak it, but shared information relating to what I described, and another party proceeded to leak such material
This is not the first time this has happened in circles like this either to boot.
I trust their word as a first hand source of this happening, and I trust that theyre not dumb enough to leak it, but whether they leaked everything to get such is another story.
In regards to the devkit nonsense: yes you would need a devkit to do this and given that its relatively easy to get one (yes really, it is) this is not very much of a problem.
I can say the circle for the vulnerability owns such hardware as well, I've seen the photos
What's the point I'm making?
The point: there's plenty of room to argue an ND employee is involved, but from the evidence (which I have submitted to ND back in February) stands to point to an ND-made security vulnerability that was exploited. Not an angry employee
While I will not give names, I will say this: I've been around, I know leaks, I listen, I watch, I keep tabs on things. I've known about this for months and kept quiet publicly but since it's blocked out now and news coverage confirmed what I've known I decided to say so publicly
I have no affiliation with the group, I have no materials from the leak, and I'm not going to. I had my ass bitten once and I dont need a second round of it, but putting the truth out there is important, because even then you'll still have people saying it was an ND employee
Don't believe what sounds like the juiciest story, even if it's what you wanna hear. Sometimes it's really that boring. Hackerman exploiting a vulnerability created by the company's own games to gain internal access.
Hopefully this has been enlightening for you
And as one final note: the person that spoke to me asked me about my previous legal run-in. That's primarily what led to this disclosure to begin with.
I do not advocate or suggest stealing and leaking. Preservation is important, but dont do it through stealing.
Tacking this onto the bottom since people insist that it was an ND employee when no, it wasnt. Why you think it's an ND employee that leaked this is still baffling to me
回复

使用道具 举报

     
发表于 2020-5-3 19:31 | 显示全部楼层
jason自己也是个二道贩子,压榨员工走不通就黑客泄密,谁知道呢
回复

使用道具 举报

     
发表于 2020-5-3 19:35 来自手机 | 显示全部楼层
我倒是觉得和现在其他娱乐行业一样,不怕坏新闻,就怕没新闻,无论是审美还是审丑,只要有话题,有流量,就能变现。所以,也许都是炒作吧

—— 来自 OnePlus GM1910, Android 10上的 S1Next-鹅版 v2.2.2.1
回复

使用道具 举报

     
发表于 2020-5-3 21:21 | 显示全部楼层
顽皮狗居然是把测试录像直接放在服务器上的吗,还是说这是业界通行做法?
以前听说这种服务器泄露还是质量效应的demo泄露,从其中的脚本引起了剧情的泄露,也是引起了很大的不满
回复

使用道具 举报

头像被屏蔽
发表于 2020-5-3 21:24 来自手机 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
回复

使用道具 举报

     
发表于 2020-5-3 21:45 来自手机 | 显示全部楼层
有内鬼比有入侵难解释多了。
回复

使用道具 举报

     
发表于 2020-5-3 21:49 | 显示全部楼层
黑服务器比QA内鬼合理多了,当年DMM的服务器漏洞让多少A片还没卖就能被下载下来
QA内鬼可是要顶着自己违反保密协议丢饭碗干的
回复

使用道具 举报

头像被屏蔽
     
发表于 2020-5-3 21:51 来自手机 | 显示全部楼层
提示: 作者被禁止或删除 内容自动屏蔽
回复

使用道具 举报

     
发表于 2020-5-3 22:04 | 显示全部楼层
luowei_nowe 发表于 2020-5-3 21:51
DMM泄露的是步兵还是骑兵?

当然是骑兵,又不是片商的服务器
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|上海互联网违法和不良信息举报中心|网上有害信息举报专区|962110 反电信诈骗|举报电话 021-62035905|Stage1st ( 沪ICP备13020230号-1|沪公网安备 31010702007642号 )

GMT+8, 2024-11-17 03:45 , Processed in 0.059932 second(s), 6 queries , Gzip On, Redis On.

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表