The Japanese publisher Koei Tecmo announced over the Christmas holiday that some personal data from 65,000 users of its English language website was hacked, leading the company to take its US and UK websites offline for the time being.
âWithin the website operated by KTE, the âForumâ page and the registered user information (approximately 65,000 entries) has been determined to the data that may have been breached,â Koei Tecmo announced in a press release on December 25, first reported on by BleepingComputer. âThe user data that may have been leaked through hacking is perceived to be the (optional) account names and related password (encrypted) and/or registered e-mail address.â
The publisherâwhich is responsible for the Dynasty Warrior series, including several Musou spin-offs and the recent Hyrule Warriors: Age of Calamityâwrote that the hack appeared to be isolated to its forum pages and didnât contain any credit card information. Koei Tecmo added that it doesnât know who launched the cyberattack yet and that it believes the likelihood of the leaks being related to a ransomware attack is low.
In addition to reporting the data breach to the EUâs General Data Protection Regulation (GDPR), the publisher has also temporarily shut down the US and UK websites. âDue to the possibility of an external cyberattack on this website, it is temporarily closed as we investigate the issue,â reads a single line of text that appears when you try to visit the Koei Tecmo America website.
Unlike the recent extensive cyberattack on Capcom in November, which affected corporate information like sales reports and development documents, this data breach appears to be isolated to player emails and passwords.
âKoei Tecmo apologies for the concern and inconvenience this may be causing to its customers and business partners,â the publisher wrote in its press release. âFor individuals who have had their e-mail addresses leaked, Koei Tecmo is determined to take the appropriate measures and act in good faith hereafter.â
Koei Tecmo didnât immediately respond to a request for comment.
Correction: the post has been updated to reflect that news of the data breach was first reported on by the data security website BleepingComputer.