Definitely a clever way to get a lot of publicity for a seemingly fairly major anticheat oversight. I believe that the intent wasn't malicious, they could have done a lot more harm if they wanted to.
Gaming
Sub for any gaming related content!
Rules:
- 1: No spam or advertising. This basically means no linking to your own content on blogs, YouTube, Twitch, etc.
- 2: No bigotry or gatekeeping. This should be obvious, but neither of those things will be tolerated. This goes for linked content too; if the site has some heavy "anti-woke" energy, you probably shouldn't be posting it here.
- 3: No untagged game spoilers. If the game was recently released or not released at all yet, use the Spoiler tag (the little ⚠️ button) in the body text, and avoid typing spoilers in the title. It should also be avoided to openly talk about major story spoilers, even in old games.
I really hope that unticking "Vote Putin" instantly kills your character.
This is the best summary I could come up with:
In an interview with TechCrunch, the hacker Destroyer2009 took credit for the hacks, saying that he did it “just for fun,” and with the goal of forcing the Apex Legends’ developers to fix the vulnerability he exploited.
The only thing Destroyer2009 said regarding the technique he used was that the vulnerability “has nothing to do with the server and I’ve never touched anything outside of the Apex process,” and that he did not hack the two players’ computers directly.
Destroyer2009 said that the window is part of a real cheat software, but not one that is public, and whose menu was slightly modified for the hacks on Sunday.
On Tuesday, Respawn, the studio that develops Apex Legends posted a statement on X (formerly Twitter), addressing the incidents.
All I can say is, the care and love shown from parties involved makes me thankful for the coworkers and devs on this game,” wrote Ford.
Easy Anti-Cheat, the developers of the anti-cheat engine used in Apex Legends (and several other games), said in a statement on Monday that it was “confident that there is no RCE vulnerability within EAC being exploited.” An RCE, or remote code execution, is a security flaw that allows a hacker to run malicious code on a target’s device remotely, such as over the internet.
The original article contains 870 words, the summary contains 216 words. Saved 75%. I'm a bot and I'm open source!
Sounds like a real honest to goodness hacker in the original (digital) sense. A+