Rockstar Games has confirmed a data breach after the threat group ShinyHunters accessed the company's Snowflake data warehouse through a compromised third-party integration, resulting in the leak of more than 78.6 million business records on April 14, 2026. Rockstar stated that no player data, passwords, payment details, personal information, source code, or GTA 6 assets were exposed, characterizing the stolen material as non-material company information.

What Happened

ShinyHunters compromised Anodot, an AI-powered cloud cost monitoring and analytics SaaS platform used by Rockstar to manage portions of its digital infrastructure. Authentication tokens were extracted from Anodot's systems, allowing the attackers to impersonate a legitimate internal service and pivot into Rockstar's connected Snowflake data warehouse. No vulnerability in Snowflake itself was exploited; the stolen tokens provided access that appeared legitimate and initially evaded detection.

Anodot had flagged connectivity issues as early as April 4, noting that its data collectors were offline across regions spanning Snowflake, Amazon S3, and Amazon Kinesis. This timeline suggests the compromise was already underway before Rockstar became aware of any anomaly.

On April 11, ShinyHunters posted a warning on its dark web leak site claiming access to Rockstar's Snowflake instances and demanding payment to suppress the data. The group set an April 14 deadline and warned of "several annoying digital problems" if Rockstar failed to comply. When Rockstar declined to negotiate, ShinyHunters released the stolen archive.

What Was Taken

The leaked dataset is described as a multi-domain analytics corpus tied to GTA Online and Red Dead Online. It includes internal business metrics such as revenue breakdowns, player engagement analytics, weekly spending figures, and operational data used for commercial decision-making. Figures cited in the leak claim GTA Online generates approximately $500 million annually, driven by roughly $7.3 million in weekly in-game purchases.

Rockstar has stated that no player credentials, payment card data, personally identifiable information, game source code, or GTA 6 development assets were included in the breach. The exposed records appear to be business intelligence and analytics data rather than user-facing information.

While 78.6 million records is a significant volume, the sensitivity skews toward competitive business intelligence rather than the kind of PII that triggers mass consumer notification obligations.

Why It Matters

This breach is the latest in a pattern of threat actors targeting cloud data platforms through third-party integrations rather than attacking the primary victim directly. ShinyHunters exploited the same strategic seam that made the 2024 Snowflake campaign so effective: trusted SaaS-to-SaaS connections that carry authentication tokens with broad data access.

For defenders, the key lesson is that supply chain risk now extends well beyond code dependencies. A cloud cost monitoring tool with read access to a data warehouse is an attack surface. The Anodot-to-Snowflake trust relationship gave ShinyHunters a clean path that bypassed Rockstar's perimeter entirely.

The incident also demonstrates ShinyHunters' continued operational maturity. The group maintained access long enough to exfiltrate a massive dataset, issued a structured extortion demand with a public deadline, and executed on the threat when negotiations failed. This is a polished, repeatable playbook.

The Attack Technique

The kill chain followed a third-party credential compromise model:

  1. Initial access: ShinyHunters compromised Anodot, the third-party SaaS vendor, and extracted authentication tokens used for Anodot's integration with Rockstar's cloud environment.
  2. Lateral movement: The stolen tokens allowed the attackers to authenticate to Rockstar's Snowflake data warehouse as a trusted service, bypassing direct authentication controls.
  3. Data exfiltration: The attackers queried and extracted over 78.6 million records from analytics datasets spanning multiple game titles.
  4. Extortion: ShinyHunters issued a public ransom demand on April 11 with an April 14 deadline, then leaked the data when Rockstar refused to pay.

The approach mirrors the broader trend of attacking the weakest node in a SaaS integration chain. Anodot's connectivity disruptions beginning April 4 suggest the attackers may have been active for at least ten days before the public leak.

What Organizations Should Do

Sources: Time's Up For Rockstar Games! Shinyhunters Leak Data Exposing 78.6 Million Records