


The information we shared in February with the President of the Personal Data Protection Office (PUODO) has also been updated. We have also contacted Interpol and Europol. Furthermore, we cannot confirm whether or not the data involved may have been manipulated or tampered with following the breach.Ĭurrently, we are working together with an extensive network of appropriate services, experts, and law enforcement agencies, including the General Police Headquarters of Poland. We are not yet able to confirm the exact contents of the data in question, though we believe it may include current/former employee and contractor details in addition to data related to our games. Today, we have learned new information regarding the breach, and now have reason to believe that internal data illegally obtained during the attack is currently being circulated on the Internet. This message is a follow-up on the February security breach which targeted the CD PROJEKT Group.

#Gog galaxy malware update#
Start News Security breach update Security breach update
