CybersecurityEntertainmentNewswireTechnology

Hacker Hijacks Apex Legends Characters in Live Matches

▼ Summary

– Apex Legends players experienced a security incident where hackers remotely hijacked their in-game characters, disconnected them, and changed their nicknames.
– The game’s publisher, Respawn, confirmed the incident was not caused by malware or an exploit like a Remote Code Execution (RCE) attack.
– The attack involved someone with administrative privileges, as evidenced by player reports of ‘RSPN Admin’ nicknames and access to server debugging tools.
– Respawn resolved the incident roughly six hours after acknowledging it, linking it to cheats in the ongoing “cat-and-mouse” battle against them.
– This follows a previous hacking incident during a 2024 tournament that forced postponed finals and damaged player trust in the game’s security.

Apex Legends players encountered a severe security breach over the weekend, with hackers remotely seizing control of characters during live matches, forcibly disconnecting users, and altering player names. The disruption, which began on Friday, saw external actors manipulating in-game avatars, attempting to move them out of bounds, and triggering widespread server disconnections. Respawn Entertainment, the game’s developer, quickly acknowledged an “active security incident” involving a bad actor capable of controlling another player’s inputs remotely.

The publisher moved to reassure its substantial player base, estimated at around half a million daily concurrent users, that the attack did not stem from a critical exploit like remote code execution (RCE) or a malware infection. Initial findings indicated the hackers could not install or execute arbitrary code on player systems. However, the in-game effects were profoundly disruptive, with many players reporting that disconnected teammates’ usernames were replaced with ‘RSPN Admin,’ suggesting a breach of administrative systems.

Community analysis pointed toward a scenario where someone obtained elevated administrative privileges, potentially accessing server debugging tools. This unauthorized access may have enabled the use of aimbot cheats and other exploits, allowing the hijackers to manipulate matches directly from the server side. Players shared clips and live streams documenting the bizarre and unauthorized character movements, highlighting the scale of the intrusion.

Approximately six hours after its initial statement, Respawn announced it had resolved the security incident. The company provided few technical details but indicated the problem was linked to cheating mechanisms. In a communication to players, Respawn emphasized the ongoing challenge of anti-cheat efforts, calling it a “constant cat-and-mouse game” and stressing that player reports were crucial in identifying this specific threat.

This event echoes a previous security crisis that shook the Apex Legends community last year, when hackers compromised professional tournament matches. That incident forced Electronic Arts to postpone finals and significantly damaged player trust in the platform’s security. The recurrence of such disruptive attacks underscores the persistent vulnerabilities in online competitive gaming environments, where maintaining server integrity and administrative access controls is paramount for player safety and competitive fairness. The publisher has not yet released a full post-mortem of the latest breach, leaving many in the community awaiting further explanation and assurances regarding future preventative measures.

(Source: Bleeping Computer)

Topics

security incident 95% player disruptions 90% respawn response 88% cheating exploits 85% anti-cheat measures 80% game security 78% community trust 75% live gameplay 72% publisher communication 70% historical incidents 68%