{"id":1002579,"date":"2026-01-09T18:06:24","date_gmt":"2026-01-09T18:06:24","guid":{"rendered":"https:\/\/www.polygon.com\/?p=465967"},"modified":"2026-01-09T18:06:24","modified_gmt":"2026-01-09T18:06:24","slug":"how-do-video-game-companies-like-game-freak-keep-getting-hacked","status":"publish","type":"post","link":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/","title":{"rendered":"How do video game companies like Game Freak keep getting hacked?"},"content":{"rendered":"<figure> <img decoding=\"async\" alt=\"\" data-caption=\"\" data-portal-copyright=\"Image: OLM\/The Pok\u00e9mon Company\" data-has-syndication-rights=\"1\" src=\"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\" \/><figcaption><\/figcaption><\/figure>\n<p class=\"has-drop-cap has-text-align-none\">Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from? Game Freak <a href=\"https:\/\/www.polygon.com\/news\/465710\/pokemon-game-freak-leak-hack\">confirmed last week<\/a> it had been hacked, with more than 2,600 pieces of employee data taken. It <em>didn\u2019t<\/em> confirm the massive heist of its game data, though, but the game data likely originates from that same breach. A hacker alleged they\u2019d acquired 1 TB of data, including source code for <em>Pok\u00e9mon Legends: Z-A<\/em> and the next-generation Pok\u00e9mon games, on top of builds of older games, concept art, and lore documents. Troves of information have already been released \u2014 and more will be uploaded to the internet, according to the hacker.\u00a0<\/p>\n<p class=\"has-text-align-none\">Simply put, <a href=\"https:\/\/www.polygon.com\/news\/465710\/pokemon-game-freak-leak-hack\">this is likely one of the biggest leaks in Pok\u00e9mon history<\/a>. It rivals notorious ransomware group Rhysida\u2019s 1.67 TB leak of hacked Insomniac Games data, <a href=\"https:\/\/www.polygon.com\/24009631\/insomniac-games-leak-hack-rhysida-files-breach\">which was released in December last year<\/a>, and a Rockstar Games hack from 2022 in which unfinished <a href=\"https:\/\/www.polygon.com\/23360809\/gta-6-leak-hack-rockstar-games-confirmed\"><em>Grand Theft Auto 6<\/em> footage was published early<\/a>. These hacks are always huge news because the video game industry is famously secretive, building hype through carefully planned teasers, trailers, and announcements. That hype is valuable to developers and publishers, but also to leakers looking for clout online, hackers looking for ransom, and players eager to consume <em>anything<\/em> about their favorite franchise. But how does this keep happening?\u00a0<\/p>\n<p class=\"has-text-align-none\">Phishing attempts happen a lot, and they\u2019re not unique to Game Freak or any other video game company, <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/2024-games-security-trends-is-a-battle-royale\">Akamai<\/a> cybersecurity researcher Stiv Kupchik told Polygon. But the audience for leaked information is huge, which means widespread attention. Video game fans clamor for this type of content.<\/p>\n<p class=\"has-text-align-none\">\u201cThere\u2019s intense interest by the fans of the product about what\u2019s coming, what people are thinking, and so on and so forth,\u201d said Justin Cappos, a New York University professor in the Tandon School of Engineering. \u201cAt least I know when I was a young boy and playing around with computer games and things like that, one of my favorite things to do was to break into my local copy of the game and reverse it and change it and make it do different things. So nowadays, there\u2019s obviously a lot of people that are quite interested in this, and video games are especially an easy target, which also makes them attractive for people like cyber criminals.\u201d<\/p>\n<p class=\"has-text-align-none\">Cappos said video game companies often prioritize other things beyond security: They focus on systems that allow quick development, often using \u201clarge teams that tend to be overworked.\u201d Nintendo is good at its security, said Cappos, but things can get hairy when it comes to Nintendo\u2019s different partners. \u201cOne of the hard things about playing defense is that you have to play defense correctly all the time,\u201d Cappos said. \u201cYou can\u2019t slip up once. And so it doesn\u2019t matter if two of the three companies did a good job. One of them messes up and you\u2019re in trouble.\u201d<\/p>\n<p class=\"has-text-align-none\">Adam Marr\u00e8, chief information security officer for cybersecurity firm Arctic Wolf, added that video game companies tend to be targeted because they may be more inclined to pay ransom to keep unreleased content offline.<\/p>\n<p class=\"has-text-align-none\">There doesn\u2019t appear to be any ransom at play in Game Freak\u2019s recent breach, but screenshots of a reported Game Freak employee\u2019s Nintendo developer portal suggest the hacker gained access to the files in a social engineering or phishing scheme \u2014 as with the Insomniac Games and <em>Grand Theft Auto 6<\/em> leaks. However, in both Rockstar Games\u2019 and Insomniac Games\u2019\u00a0cases, known hacking groups claimed responsibility for the leaked information. A group called Lapsus$ claimed responsibility for the <em>GTA6<\/em> breach, whereby a 17-year-old hacker used phishing and social engineering <a href=\"https:\/\/www.polygon.com\/24011225\/rockstar-games-gta-6-hack-sentencing\">methods to gain access to Rockstar Games\u2019 company Slack channels<\/a>. (The hacker was sentenced to indefinite custody at a hospital.) A different group, Rhysida, claimed responsibility for the Insomniac Games leak; <a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/rhysida-ransomware-sector-alert-tlpclear.pdf\">Rhysida is known for using phishing attacks<\/a> to gain access to servers. The motivation for Game Freak\u2019s recent hack isn\u2019t clear \u2014 but sometimes, it can be led by clout.<\/p>\n<p class=\"has-text-align-none\">\u201cGaming is a very high-profile industry,\u201d Arkose Labs CEO Kevin Gosschalk said. \u201cMany of the attackers targeting the gaming industry are also gamers who are just interested in leaking upcoming games. It\u2019s high-publicity and gives them a lot of clout.\u201d<\/p>\n<p class=\"has-text-align-none\">Social engineering and phishing don\u2019t necessarily require special tools or technical skill: Instead, hackers using these methods try to trick a victim into providing access to an account or downloading malicious software. Cappos said research shows that 20% of people who get a credible phishing attempt \u2014 \u201cnot just a random Nigerian prince email,\u201d he said \u2014 fall for it.<\/p>\n<p class=\"has-text-align-none\">\u201cPhishing works by enticing the victim into sharing sensitive credentials or access tokens, or executing commands or files sent by the attacker,\u201d Kupchik told Polygon. \u201cJust like in traditional fishing, it starts with a bait \u2014 it could be an email, a document, or a website, appearing legitimate but in fact under the attacker\u2019s control. The victim would think they\u2019re downloading legitimate software, or logging into an internal site, but instead they would be delivering their credentials to the attackers or run malicious payloads unsuspectingly.\u201d<\/p>\n<p class=\"has-text-align-none\">The \u201ceasy\u201d part is getting those credentials to log in, RSA Security senior manager Lorenzo Pedroncelli said. The hard part is getting past the multi-factor authentication that secure platforms may also require \u2014 that\u2019s where social engineering comes in. \u201cIf you don\u2019t have MFA in place, then a phished email, password, or other credential can do a lot more damage,\u201d Pedroncelli said. Cappos added that SMS-based authentication is less secure than other types, but there are still ways in. \u201cUsually what happens with most of the authentication-based hacks is that they don\u2019t have multi-factor authentication enabled everywhere,\u201d he said. \u201cSome people have it, some people don\u2019t, and they\u2019re able to find a way to get in through people that have more access than they should and don\u2019t have multi-factor authentication enabled.\u201d Otherwise, an attacker has to trick a person into giving their MFA codes up. (Cappos recommends you use secure multi-factor authentication <em>and<\/em> keep your software up to date, because the latter can be yet another way folks get in, by exploiting out-of-date software.)<\/p>\n<p class=\"has-text-align-none\">The latest Game Freak leak is a much different sort of leak than, say, the time that someone took photos of the <em>Pok\u00e9mon Sword<\/em> and <em>Pok\u00e9mon Shield<\/em> strategy guides ahead of the games\u2019 release. <a href=\"https:\/\/www.polygon.com\/22545955\/the-pokemon-company-sword-shield-strategy-guide-leak-lawsuit-settlement\">The Pok\u00e9mon Company settled a lawsuit in 2021<\/a> with the people who leaked those photos on Discord, ordering them to pay $150,000 each. In that previous situation, the information that was leaked was limited to things that were printed inside the strategy guide, like new Pok\u00e9mon. It was information that The Pok\u00e9mon Company didn\u2019t want out, but it\u2019s a lot less serious than what\u2019s been shared online from this massive recent hack. It\u2019s also a different scenario than when employees leak information to the press, <a href=\"https:\/\/kotaku.com\/leaked-documents-reveal-that-fallout-4-is-real-set-in-1481322956\">like with <em>Fallout 4<\/em>\u2019s setting<\/a>, or when Microsoft <a href=\"https:\/\/www.polygon.com\/23882286\/microsoft-xbox-phil-spencer-court-leak-secrets\">accidentally uploaded redacted court documents<\/a> to a file repository associated with the <em>Federal Trade Commission v. Microsoft<\/em> case.<\/p>\n<p class=\"has-text-align-none\">Cybersecurity experts who spoke to Polygon say it\u2019s too early to fully understand the impact or motivations of the hackers; Insomniac Games was hacked by a ransomware group, and their stated interest was financial. The person who hacked Game Freak appears to have some affinity for Game Freak and Pok\u00e9mon: <a href=\"https:\/\/x.com\/soulsilverart\/status\/1845515307508752415\">They claimed to have source code<\/a> for <em>Pok\u00e9mon Legends: Z-A<\/em> and the next-generation games, but reportedly said they \u201cwill not ruin those game\u2019s releases.\u201d<\/p>\n<p><a href=\"https:\/\/www.polygon.com\/analysis\/465967\/pokemon-game-freak-nintendo-hack-leak\">Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from? Game Freak confirmed last week it had been hacked, with more than 2,600 pieces of employee data taken. It didn\u2019t confirm the massive heist of its game data, though, but the game data likely originates from that same breach. A hacker alleged they\u2019d acquired 1 TB of data, including source code for Pok\u00e9mon Legends: Z-A and the next-generation Pok\u00e9mon games, on top of builds of older games, concept art, and lore documents. Troves of information have already been released \u2014 and more will be uploaded to the internet, according to the hacker.\u00a0 Simply put, this is likely one of the biggest&hellip;<\/p>\n<p class=\"excerpt-more\"><a class=\"blog-excerpt button\" href=\"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":1002580,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-1002579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-polygon"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do video game companies like Game Freak keep getting hacked? | Arcader News<\/title>\n<meta name=\"description\" content=\"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do video game companies like Game Freak keep getting hacked? | Arcader News\" \/>\n<meta property=\"og:description\" content=\"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Arcade News\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-09T18:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"362\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arcade News\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arcade News\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/\"},\"author\":{\"name\":\"Arcade News\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/#\\\/schema\\\/person\\\/8460f5e5076b52fb2369f2f7ce6f2839\"},\"headline\":\"How do video game companies like Game Freak keep getting hacked?\",\"datePublished\":\"2026-01-09T18:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/\"},\"wordCount\":1289,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/arcader.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\",\"articleSection\":[\"Polygon\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/\",\"url\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/\",\"name\":\"How do video game companies like Game Freak keep getting hacked? | Arcader News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/arcader.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\",\"datePublished\":\"2026-01-09T18:06:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/#\\\/schema\\\/person\\\/8460f5e5076b52fb2369f2f7ce6f2839\"},\"description\":\"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/arcader.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/arcader.org\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg\",\"width\":480,\"height\":362,\"caption\":\"How do video game companies like Game Freak keep getting hacked?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/arcader.org\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How do video game companies like Game Freak keep getting hacked?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/arcader.org\\\/news\\\/\",\"name\":\"Arcade News\",\"description\":\"Free Arcade News from the Best Online Sources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/arcader.org\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/arcader.org\\\/news\\\/#\\\/schema\\\/person\\\/8460f5e5076b52fb2369f2f7ce6f2839\",\"name\":\"Arcade News\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g\",\"caption\":\"Arcade News\"},\"sameAs\":[\"https:\\\/\\\/cricketgames.tv\"],\"url\":\"https:\\\/\\\/arcader.org\\\/news\\\/author\\\/arcade-news\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How do video game companies like Game Freak keep getting hacked? | Arcader News","description":"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/","og_locale":"en_US","og_type":"article","og_title":"How do video game companies like Game Freak keep getting hacked? | Arcader News","og_description":"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?","og_url":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/","og_site_name":"Arcade News","article_published_time":"2026-01-09T18:06:24+00:00","og_image":[{"width":480,"height":362,"url":"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg","type":"image\/jpeg"}],"author":"Arcade News","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Arcade News","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#article","isPartOf":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/"},"author":{"name":"Arcade News","@id":"https:\/\/arcader.org\/news\/#\/schema\/person\/8460f5e5076b52fb2369f2f7ce6f2839"},"headline":"How do video game companies like Game Freak keep getting hacked?","datePublished":"2026-01-09T18:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/"},"wordCount":1289,"commentCount":0,"image":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg","articleSection":["Polygon"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/","url":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/","name":"How do video game companies like Game Freak keep getting hacked? | Arcader News","isPartOf":{"@id":"https:\/\/arcader.org\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#primaryimage"},"image":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg","datePublished":"2026-01-09T18:06:24+00:00","author":{"@id":"https:\/\/arcader.org\/news\/#\/schema\/person\/8460f5e5076b52fb2369f2f7ce6f2839"},"description":"Over the weekend, Pok\u00e9mon source code, art, and other documentation quickly spread across social media and other internet forums. Where did it come from?","breadcrumb":{"@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#primaryimage","url":"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg","contentUrl":"https:\/\/arcader.org\/wp-content\/uploads\/2024\/10\/how-do-video-game-companies-like-game-freak-keep-getting-hacked.jpg","width":480,"height":362,"caption":"How do video game companies like Game Freak keep getting hacked?"},{"@type":"BreadcrumbList","@id":"https:\/\/arcader.org\/news\/how-do-video-game-companies-like-game-freak-keep-getting-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arcader.org\/news\/"},{"@type":"ListItem","position":2,"name":"How do video game companies like Game Freak keep getting hacked?"}]},{"@type":"WebSite","@id":"https:\/\/arcader.org\/news\/#website","url":"https:\/\/arcader.org\/news\/","name":"Arcade News","description":"Free Arcade News from the Best Online Sources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arcader.org\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/arcader.org\/news\/#\/schema\/person\/8460f5e5076b52fb2369f2f7ce6f2839","name":"Arcade News","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3fea48a614d86edd987bc7bb25f4707c69546d4b1f78ad4aa20b26316bad1f9d?s=96&d=mm&r=g","caption":"Arcade News"},"sameAs":["https:\/\/cricketgames.tv"],"url":"https:\/\/arcader.org\/news\/author\/arcade-news\/"}]}},"_links":{"self":[{"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/posts\/1002579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/comments?post=1002579"}],"version-history":[{"count":1,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/posts\/1002579\/revisions"}],"predecessor-version":[{"id":1455842,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/posts\/1002579\/revisions\/1455842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/media\/1002580"}],"wp:attachment":[{"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/media?parent=1002579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/categories?post=1002579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/arcader.org\/news\/wp-json\/wp\/v2\/tags?post=1002579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}