Code leaks and game unpacking, the sword of Damocles hanging over the developer’s head

Recently, a leaker has disclosed the massive content of GTA 6 that has not yet been released on the Internet, including not only 90 game videos with a total length of more than 52 minutes, but also more than 10,000 lines of game source code. The leaker said that a WIP (in development) version of the game may be released in the future.

Rockstar has officially admitted that the internal network has been “invaded by a third party”, and promised that the incident will not have long-term impact, and the development of GTA6 will still proceed as planned. But whether this leak will have a longer-term impact is still unknown.

The Naughty Dog producer, who has experienced a game leak incident, tweeted on the 18th, lamenting the problems related to the game leak, and encouraged the producers not to be discouraged and continue to make the game better. The game was also leaked before the release of Naughty Dog’s “The Last of Us: Part 1”.

“Want to say to my colleagues who have been affected by the recent leak, I know you’re going to be stressed out right now, but this will pass. One day we’ll play your game and appreciate your craftsmanship, and the leak itself Just a footnote in a Wikipedia page. Go ahead and keep making art.”

In addition, some people are fishing in troubled waters, trying to get gold in this leak. A person who claimed to be a leaker claimed to have the source code of “Three One Dog” and “GTA 6”, and publicly sold the source code of “Three One Dog” he held on social platforms, accepting no Below a five-figure offer, he will keep the GTA 6 source code in his own hands.

The follow-up is that he has successfully defrauded 100,000 US dollars through digital currency transactions, and the deceived only got a ball of air. At present, the scammer has already sold out, and the identity of the deceived person has not yet been confirmed.

号称是泄露者的Tea Pot Tea Pot claims to be the leaker

This kind of code leak incident is not an isolated case. Similar incidents are emerging one after another. Developers must always be careful not to be targeted by hackers and become the chopping block in the hearts of hackers.

In February last year, CDPR announced that multiple internal files and game source codes of games such as “The Witcher 3”, “Cyberpunk 2077” and “Gwent Cards” were stolen by hackers. Even the next-gen version of The Witcher 3, which was originally intended to be launched in the second half of this year, was included.

The corresponding way of CDPR is to submit a digital copyright notice to those who disseminate and share the source code, requiring them to remove all torrent links to share. However, after a while, the source code for The Witcher 3 and Cyberpunk 2077 reappeared on the resource site. As long as the source code ever appears on the Internet, its dissemination and sharing cannot be completely cut off.

In July 2020, an anonymous user published the source code and development library files of more than a dozen Nintendo classic games on overseas forums, including “Super Mario World” and “The Legend of Zelda: The Triangle of Gods”. Wait for Nintendo’s first-party works. Nintendo also introduced an intelligence security management mechanism internally after the incident.

This isn’t the first time Nintendo has had a leak. As early as 2016, on the eve of the release of “Pokémon Sun/Moon”, a European player got the game cartridge in advance, and the contents of the cartridge were shared with many game websites and forums such as GBA Temp. A large number of players played the game content in advance by downloading this package.

Nintendo didn’t ignore it. A day before the official release of the game, Nintendo issued an official statement that any user’s game device with unauthorized game codes will be completely banned from using Nintendo’s networking capabilities. It was later discovered that 6,000 players had been banned.

A long time ago, there was a well-known and dramatic code leak that also caused huge losses to the official: “Half-Life 2” was originally expected to be officially released at the end of September 2003, but a week before the release, the official began. Ambiguous. It turned out that the development progress of the project was not satisfactory, and the game could not be released on time within the announced date, but the official failed to inform the players of the matter in time. So by November, some hackers directly posted the source code and some map materials on the Internet.

The leaked content is a typical development version, players can enter the game and experience most of the scenes in the game. Some people estimate that this leak has brought at least 100 million losses to Valve – if the leaker of “GTA 6” chooses to release the developer version, then Take-Two will also suffer huge losses, and may lead to “GTA 6” ” delayed release.

Unlike other leaks, the most dramatic part of the “Half-Life 2” leak is that a few months after the code was leaked, the hacker Gembe took the initiative to contact G fat via email, he said that he used a disguised as a Warcraft 3 key. The sdbot program conducts server intrusion on G fat computers. He hoped that Fat G could get over his past suspicions and asked to join Valve. Fat G took all the measures and had a 40-minute call with the hacker on the grounds of an online interview, asking the hacker to reveal all the facts of his crime.

G fat recorded the call, and the FBI accurately located the location of the hacker Gembe far away in Germany through the recording. Finally, on May 7, 2004, Gembe, who was only 18 years old, was arrested by the German police at his home.

So, aside from giving players first-hand illegal information about games that have not yet been released, and letting players illegally try them out in advance, what else can the game source code do?

There are three main purposes, the first is the game private server, just like the cracked version of the game such as collapse 3, as long as there is the game source code, you can make an identical game. It’s just that they are fixed and no one will update new game versions. From 2012 to 2013, “World of Warcraft: Mystery of the Pandaren” was set up by criminals by paying for the source code to set up private servers, and made profits by collecting membership fees and selling virtual items;

The second is understanding game mechanics. Through the source code, you can view various mechanisms in the game, including the probability of game shipments, etc. Some people will also use the game mechanics given in the source code to make corresponding script plug-ins for profit;

The third is a skin-changing game, which directly applies the source code, adds some art resources, program textures, and modifies the copywriting in the game. A game that looks completely different on the outside, but is identical in function and gameplay is launched. .

Not only console games, but mobile games also face the problem of code leakage. However, the situation of mobile games may not be that serious. The main problem of mobile games is the problem of game unpacking.

What is game unpacking? To put it simply, the mobile game will put the unpublished data before the next update into the client each time the version is updated, and by “demolition” the client, the data such as the newly added pictures are extracted, which is the game. of unpacking. Unlike console games, which require superb hacking skills to decipher the code, the operation of unpacking mobile games is relatively simple, and you can even find various Xiaobai-style unpacking tutorials with a little Baidu. As long as someone wants, they can do it themselves and have enough food and clothing.

From the actual situation, various problems have also occurred in the unpacking of mobile games. The Otome game “Love of Light and Night” has had several events in which the event card surface was leaked in advance. The most recent one was the birthday card of Xia Mingxing, the character that can be attacked. The information originally scheduled to be released on May 22 was released a month in advance by the unpacker. Players also expressed strong dissatisfaction with this, believing that it destroyed the sense of ritual they expected the arrival of the card face, and the information revealed in advance completely failed their surprise. The official has also issued a statement strongly condemning the stop of this unpacking behavior.

“Honor of Kings” is also plagued by unpacking. The whistleblower, Xian Gedi, broke the news on Weibo by unpacking the game’s “Five Tiger Generals” and “Four Beauties” series of skins in the game’s “Five Tiger Generals” and “Four Beauties” series of skins. Skill special effects and part of the modeling caused players to criticize the official production level, and finally the official overthrow and redo , causing some losses. The official also sued Emperor Xiange. At present, Emperor Xiange has emptied all the content of Weibo and issued an apology statement, saying that he will not release the breaking information of “Glory of the King” in the future.

Code leaks and unpacking of mobile games are like the sword of Damocles hanging over developers’ heads, and they will be cut down at some point, causing developers to suffer heavy losses. What developers can do is to improve their own security vulnerabilities and reduce the possibility of criminals committing crimes. As a player, what you can do is not to actively search for relevant leaked information, not to spread and not to share the leaked content, and to make the game industry cleaner.

Finally, attach a homemade GTA joke (maybe not too funny):

“Report to the boss, GTA 5 is still being bought, and the release of GTA 6 is probably a little off.”

“Who is still buying, let me check!”

“Yes!”

“Leader! Something is wrong!”

“Say!”

“GTA 6 code leaked! They may be forced to delay the release!”

“What!? What bastard did it! Check it out for me, I’m going to play GTA 6 on time! Got it?!”

“As ordered!”

This article is reproduced from: https://www.yystv.cn/p/9790
This site is for inclusion only, and the copyright belongs to the original author.