Ready or Not studio Void Interactive confirms it was hacked in March but says 'no user-related data' was stolen
I guess they weren't ready.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
Ready or Not developer Void Interactive has confirmed that it suffered a significant hack that saw at least some of the game's source code stolen, but said that no data relating to Ready or Not players or its own staff was taken.
The hack was first reported by Insider Gaming, which said that more than 4TB of data was taken by a ransom group in March. The site said it was shown the contents of the stolen data, which includes the Ready or Not source code along with console builds of the game and images of it running on a PlayStation 4 test kit.
While the hack happened a month ago, Void Interactive hadn't commented on it until today, when it confirmed the breach with Kotaku, saying it was the result of a vulnerability in the on-premises version of TeamCity. The studio said "no user-related data or staff information has been breached during this incident," and that only "some source code" and directory information was taken. "Our development assets and proprietary code remain secure and intact."
"Evidence from our ongoing investigation suggests that the attack was limited to the TeamCity services interface," Void Interactive said. "As a consequence, the attackers were able to obtain screenshots of top-level project and company-related information. However, it’s important to note that this does not involve any sensitive data leakage."
Ready or Not went into full release in December 2023, after a rough pre-release period that saw the developer split with original publisher Team17, as well as a brief removal from Steam. More notably, Void Interactive has courted controversy by including a school shooting level and a nightclub shooting level, which was added to the game on the 6th anniversary of the 2016 Pulse Nightclub mass murder in Florida that left 49 people dead and 53 more wounded.
Despite those controversies, Ready or Not was a significant success, launching to a "very positive" reception across more than 134,000 user reviews on Steam.
I've reached out to Void Interactive for more information on how the hack will impact the future development of Ready or Not, and will update if I receive a reply. In the meantime, better ready than not: Even if no user data was stolen in this case, it's never a bad time to change your passwords, and ensure you have 2FA enabled while you're at it.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
Correction: The report originally stated the vulnerability was found in cloud services provided by TeamCity. TeamCity later clarified that vulnerabilities were actually identified in the on-premises TeamCity version.

Andy has been gaming on PCs from the very beginning, starting as a youngster with text adventures and primitive action games on a cassette-based TRS80. From there he graduated to the glory days of Sierra Online adventures and Microprose sims, ran a local BBS, learned how to build PCs, and developed a longstanding love of RPGs, immersive sims, and shooters. He began writing videogame news in 2007 for The Escapist and somehow managed to avoid getting fired until 2014, when he joined the storied ranks of PC Gamer. He covers all aspects of the industry, from new game announcements and patch notes to legal disputes, Twitch beefs, esports, and Henry Cavill. Lots of Henry Cavill.

