Cyberpunk 2077 developer CD Projekt hit by ransomware attack
Hackers claim to have accessed unreleased Witcher 3 source code and threaten to leak it unless a payment is made


CD Projekt, the developer behind games such as Cyberpunk 2077 and The Witcher, has fallen victim to a cyber attack that saw hackers access its internal network and threaten to leak sensitive data.
The Polish games company confirmed on Twitter that a portion of its internal systems had been compromised, with hackers obtaining company data as well as encrypting a number of developer devices.
In a ransom note shared by the company, the hackers claimed to have accessed source code for games including Cyberpunk 2077, Gwent, and an unreleased version of The Witcher 3, and threatened to leak it unless a payment was made.
They also managed to obtain documents containing accounting, administration, legal, HR, and investor relations information.
A CD Projekt spokesperson told IT Pro that they are not able to provide further information on the impact of the attack on future game development or the sum requested in the ransom. However, the company made it clear that they were not intending to give in to the hackers' demands.
“We will not give in the demands nor negotiate with the actor, being aware that this may eventually lead to the release of the compromised data,” it said, noting that it is still investigating the attack and has “already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office", which is the Polish equivalent of the ICO.
RELATED RESOURCE
In the statement, CD Projekt added that it has secured its “IT infrastructure and begun restoring the data” from backups and that no customer data was impacted by the attack.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ESET cybersecurity specialist Jake Moore said that it seems as if CD Projekt had “the correct protocol in place to withstand such demands and upheaval”.
“All good businesses have critical redundancies in place to mitigate the risk and this can only be truly simulated by testing the backups regularly and red teaming the company. We, unfortunately, live in a world where very little remains untouchable but the forward-thinking decision-makers understand this risk and spend money and time in reducing the impact,” he added.
The attack on CD Projekt comes after three other major gaming developers were targeted in the last few months. Ubisoft and Crytek were hit by the Egregor ransomware gang in October 2020, while Capcom fell victim to the Ragnar Locker group a month later.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie Published
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott Published
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott Published
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz Published
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz Published
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz Published
-
There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims
News Security experts have warned the BlackLock group could become the most active ransomware operator in 2025
By Solomon Klappholz Published