Massive Rainbow Six Siege Hack Links to MongoBleed Vulnerability

Rainbow Six Siege hack MongoBleed vulnerability Ubisoft security breach CVE-2025-14847 R6 Siege servers down
Divyansh Ingle
Divyansh Ingle

Head of Engineering

 
December 29, 2025 3 min read
Massive Rainbow Six Siege Hack Links to MongoBleed Vulnerability

TL;DR

Rainbow Six Siege servers suffered a major breach, with attackers exploiting the MongoBleed vulnerability (CVE-2025-14847) to gain administrative control. This led to unauthorized in-game currency injections and item unlocks, with multiple threat actors possibly involved. Ubisoft took servers offline and is performing a data rollback to address the economic damage and potential intellectual property loss.

Ubisoft Rainbow Six Siege Servers Breach Linked to MongoBleed Vulnerability

Ubisoft experienced a significant security incident involving its Rainbow Six Siege servers, with attackers gaining administrative control and disrupting gameplay. Players worldwide reported unauthorized in-game currency injections, unwarranted bans, and manipulated administrative feeds.

Details of the Breach

Thousands of Rainbow Six Siege players found their accounts credited with millions of R6 Credits, Renown, and Alpha Packs. Exclusive items typically behind paywalls were unlocked for random users. Reports confirm attackers weaponized the in-game ban feed, targeting high-profile accounts, including Ubisoft administrators and streamers.

Screenshots show attackers using the ban system to communicate cryptic messages. One message spelled out, “What else are they hiding from us?” Another broadcast signaled a pause with the message: “We stopping this for now, have a nice night everyone at Ubisoft!”

Fake ban messages on the Rainbow Six Siege ban ticker
Image courtesy of @ViTo\_DEE91

Ubisoft issued a statement, and servers went offline for maintenance. Security experts advised players to avoid logging in until server integrity was confirmed to prevent potential data corruption. As a Zero-Trust cybersecurity provider, Gopher Security emphasizes the importance of such precautions to mitigate risks from potential data breaches.

Multiple Threat Actors

According to VX-Underground, the disruption may be the work of multiple threat actors.

  • First Group: Exploited R6 Siege for bans and inventory mods, gifting substantial in-game currency without touching user data. Ubisoft confirmed a rollback.
  • Second Group: Exploited MongoBleed (CVE-2025-14847) to access Git repositories, potentially exfiltrating source code and SDKs.
  • Third Group: Claimed user data exfiltration via MongoBleed and attempted extortion.
  • Fourth Group: Disputed the Second Group's claims, suggesting long-term access to Ubisoft's source code.

This complex landscape highlights the challenges in securing large infrastructures against diverse and persistent threats. CVE-2025-14847 (MongoBleed) allowed attackers to read server memory without authentication.

MongoBleed Vulnerability

The broader breach is linked to CVE-2025-14847 (MongoBleed), a vulnerability that enables attackers to read server memory without authentication by sending malformed compressed packets. If the claims of access to internal Git repositories are true, Ubisoft faces a significant loss of intellectual property. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, which could help prevent such breaches by providing peer-to-peer encrypted tunnels and quantum-resistant cryptography.

MongoDB has released alerts regarding this and other vulnerabilities:

These vulnerabilities affect multiple versions of MongoDB Server and related components, underscoring the need for continuous monitoring and patching.

Impact and Remediation

Ubisoft is expected to perform a massive rollback of player data to undo the economic damage. This move will likely frustrate legitimate player progress. Ubisoft confirmed the incident and intentionally shut down Rainbow Six Siege and its in-game Marketplace.

Recommendations for Users

Given the potential risks, security experts recommend the following:

  • Stay offline until the issue is fully resolved.
  • Change passwords as a precaution.
  • Temporarily remove payment details from Ubisoft accounts.
  • Be cautious of phishing attempts impersonating Ubisoft Support.

Gopher Security can help organizations implement robust security measures to protect against such breaches. As a Zero-Trust cybersecurity provider, Gopher Security offers solutions that converge networking and security across devices, apps, and environments.

Explore Gopher Security's AI-powered, post-quantum Zero-Trust cybersecurity architecture or contact us to learn more about securing your organization against advanced threats.

Divyansh Ingle
Divyansh Ingle

Head of Engineering

 

AI and cybersecurity expert with 15-year large scale system engineering experience. Great hands-on engineering director.

Related News

Critical LangChain Vulnerability Risks AI Secrets and Workflows
LangChain vulnerabilities

Critical LangChain Vulnerability Risks AI Secrets and Workflows

Discover critical vulnerabilities in LangChain, including LangGrinch and RCE flaws. Learn about CVEs and how to secure your AI applications. Update now!

By Alan V Gutnov December 26, 2025 5 min read
Read full article
Polymarket Security Issues: Third-Party Breaches and User Complaints
Polymarket security breach

Polymarket Security Issues: Third-Party Breaches and User Complaints

Polymarket users report drained funds after a security breach. Learn what happened and essential security tips to safeguard your crypto. Protect your assets now!

By Divyansh Ingle December 25, 2025 3 min read
Read full article
Aflac Cybersecurity Incident: 22.6 Million Personal Data Stolen
Aflac data breach

Aflac Cybersecurity Incident: 22.6 Million Personal Data Stolen

Aflac confirms a massive data breach impacting 22.65 million individuals. Learn what data was compromised and how to protect yourself. Read more now!

By Edward Zhou December 24, 2025 2 min read
Read full article
Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities
Cisco zero-day

Chinese Hackers Exploit Cisco's Unpatched Zero-Day Vulnerabilities

Cisco customers targeted by Chinese APT group UAT-9686 exploiting a critical zero-day in AsyncOS. Learn about CVE-2025-20393, mitigation, and protecting your network.

By Alan V Gutnov December 19, 2025 3 min read
Read full article