• World CyberCon India
Firewall Daily Hacks Main Story

Grand Theft Auto 6 Leaked by Uber Hacker

According to sources, an unknown hacker stole the game's source code and videos from Rockstar Game's Slack server and Confluence wiki.

Grand Theft Auto 6 Leaked by Uber Hacker
  • PublishedSeptember 19, 2022
Listen to this story

Grand Theft Auto 6 has been one of gamers’ most talked about topics since GTA 5. Fans have been anticipating the upcoming instalment in the renowned open-world series from Rockstar Games. However, players were only guessing how or what the next generation of the Grand Theft Auto game would be like, but a recent game leaked pulverized the excitement. 

An account on GTAForums that goes by the game “teapotuberhacker” posted almost 90 videos of the leaked gameplay from GTA VI. Instead of being a fully furnished product, the videos contain unfinished components, half-baked character models, and missing textures. According to sources, an unknown hacker stole the game’s source code and videos from Rockstar Game’s Slack server and Confluence wiki.

Grand Theft Auto 6 leaked online

The hacker has allegedly leaked a total of 90 stolen videos on GTAForums, and they are available in RAR archive format. The video contains a female character who enters a diner, goes to strip clubs, and has a chat with people by the pool. The video hints that the setting for GTA VI will be based on Vice City (a fictional city based on Miami and Miami Beach). 

The leaked videos appear to be created by developers and designers as most of them were incomplete and include various gaming tests such as camera tests, NPC tracking, and conversations between the game’s protagonist and other NPCs (non-playable characters).

Moreover, the hacker claims credits for the recent Uber breach and says they obtained the GTA VI leaked videos by hacking into a Rockstar employee’s Slack account.

Hacker released Grand Theft Auto 6 leaked screenshots

After forum members were skeptical over the leak, the hacker claimed to have been involved in other recent attacks, including the Uber attack where the threat actor hacked into one of the employee’s accounts and posted explicit images on an employee’s internal information page.  

The post shared by the hacker not only contained source code from Grand Theft Auto 6 but also from Grand Theft Auto V, which further solidifies the hacker’s claims about the breach. Rockstar games is yet to release any official statement or response to the leaked data. 

The leaked videos made their way into YouTube and other social media platforms. However, Rockstar Games is issuing DMCA infringement notices and takedown requests for the uploaded videos. 

At the time of writing this, the uploaded videos are no longer available. Rockstar Game might release an official statement soon because many cybersecurity experts and industry specialists have confirmed the leak to be valid.

No real evidence of the involvement of LAPSUS$

“There isn’t enough information available to reasonably conclude that LAPSUS$ is behind the Rockstar Games leak. While the attacks linked to LAPSUS$ and the incident at Rockstar share tactics, they are relatively simple ones which isn’t a very convincing connection.

“Mimicking tactics is relatively common among threat actors. In the aftermath of LAPSUS$’s flashy rise to infamy and then sudden quiet period, ransomware and extortion actors have sought to emulate their tactics because, frankly, they worked.


“Threat actors focus on opportunistic data theft and threats to publicly release the stolen data, attempting whatever tactics they deem necessary to put pressure on the victim to pay up, such as threatening customers, partners, insurers, investors 

and courting attention from the news and social media. In the case of Rockstar Games, the attacker is threatening to leak more Grand Theft Auto content, which Rockstar can allegedly prevent if it pays up.” — Claire Tills, Senior Research Engineer, Tenable

Written By
Ashish Khaitan

Ashish is a technical writer at The Cyber Express. He adores writing about the latest technologies and covering the latest cybersecurity events. In his free time, he likes to play horror and open-world video games.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.