1 min read

Wii, N64, and GameCube Source Codes Leak Online

Silviu STAHIE

May 05, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Wii, N64, and GameCube Source Codes Leak Online

A massive data leak is hitting Nintendo as source code, demos, videos and other content for Wii, N64 and GameCube become available online, following the publishing of a steady stream of information on 4Chan in the past few weeks.

The first information about a possible Nintendo data leak appeared on Dexerto, with reports of canceled games named “Pokemon Pink.” The source code was published on 4Chan, and it seemed to be the entire extent of the breach.

Now, more information has been published on the forums, including source code for Nintendo Wii”s operating system boot0/1/2, along with the similar resources for N64 and GameCube. The leaked data arrive over the course of a few weeks, and a Resetera user indexed it all.

“The biggest and craziest thing in this leak is the datasheets, block diagram and Verilog files for every component,”said Atheerios, a ResetEra user. “Verilog is a hardware description language; is used to describe circuits via code, so with this we can learn how every single piece of the Wii was made.”

The data also contained several internal demos, an official GameBoy emulator and SDKs. There”s no indication that this is the extent of the data breach, and more may be on the way.

Nintendo has been silent so far, but the data breach may have originated with a partner company called BroadOn that worked on Nintendo Wii. While the leaked data pertains to old software and hardware, as none of the affected systems are still sold today, it”s still a problem for the company because the same source code can be used to develop emulators and similar hardware.

Unfortunately for Nintendo, this is the second time their name appears in the news concerning a security problem in short order. Just last week, the company admitted that around 160,000 accounts were compromised by attackers using a method called credential stuffing.

This goes to show that hackers are not always interested in bank accounts and private health data. Sometimes, they target some of the most unlikely sources.

tags


Author



Right now

Top posts

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read
John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

John Oliver Shows the Dark Side of Data Brokerage on Last Week Tonight

April 15, 2022

3 min read
Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

Bitdefender Labs Warns of Phishing Scams Targeting MetaMask Users

April 14, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Israeli Authorities Seized Severs of Breached Company for Not Cooperating Israeli Authorities Seized Severs of Breached Company for Not Cooperating
Silviu STAHIE

July 04, 2022

1 min read
FTC warns LGBTQ+ community of extortion scams targeting them on dating apps FTC warns LGBTQ+ community of extortion scams targeting them on dating apps
Graham CLULEY

July 01, 2022

2 min read
OpenSea Breach Exposes 1.8 Million Email Addresses. How does it affect you? OpenSea Breach Exposes 1.8 Million Email Addresses. How does it affect you?
Radu CRAHMALIUC

June 30, 2022

3 min read