• Player2@lemm.ee
    link
    fedilink
    arrow-up
    10
    arrow-down
    1
    ·
    3 months ago

    Definitely a clever way to get a lot of publicity for a seemingly fairly major anticheat oversight. I believe that the intent wasn’t malicious, they could have done a lot more harm if they wanted to.

  • AutoTL;DR@lemmings.worldB
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    3 months ago

    This is the best summary I could come up with:


    In an interview with TechCrunch, the hacker Destroyer2009 took credit for the hacks, saying that he did it “just for fun,” and with the goal of forcing the Apex Legends’ developers to fix the vulnerability he exploited.

    The only thing Destroyer2009 said regarding the technique he used was that the vulnerability “has nothing to do with the server and I’ve never touched anything outside of the Apex process,” and that he did not hack the two players’ computers directly.

    Destroyer2009 said that the window is part of a real cheat software, but not one that is public, and whose menu was slightly modified for the hacks on Sunday.

    On Tuesday, Respawn, the studio that develops Apex Legends posted a statement on X (formerly Twitter), addressing the incidents.

    All I can say is, the care and love shown from parties involved makes me thankful for the coworkers and devs on this game,” wrote Ford.

    Easy Anti-Cheat, the developers of the anti-cheat engine used in Apex Legends (and several other games), said in a statement on Monday that it was “confident that there is no RCE vulnerability within EAC being exploited.” An RCE, or remote code execution, is a security flaw that allows a hacker to run malicious code on a target’s device remotely, such as over the internet.


    The original article contains 870 words, the summary contains 216 words. Saved 75%. I’m a bot and I’m open source!