


**Ubisoft’s Rainbow Six Siege Hit by Major Hack, Leading to In-Game Disorder**
Over the past weekend, Ubisoft’s well-known tactical shooter, *Rainbow Six Siege*, fell victim to a substantial hack that resulted in the unauthorized spread of billions of in-game credits among players. This breach forced Ubisoft to temporarily take both the game and its marketplace offline, with access only being restored in the recent hours as they worked to address the problem.
On December 27, Ubisoft recognized the circumstances through a post on *Rainbow Six Siege*’s official X account, indicating they were “aware of an incident” and were “working on a resolution.” Shortly after, they informed that the game and marketplace would be deliberately shut down to aid their response to the hacking event.
The hacking incident targeted the *R6* servers, leading not just to the distribution of enormous sums of in-game currency but also the unexpected appearance of ultra-rare weapon skins in players’ inventories, alongside an abnormal excess of Renown and Alpha Packs. However, this tumultuous situation was not consistent; many players reported their in-game balances being completely erased.
As the events unfolded, there was a stretch of five hours with no communication from Ubisoft, sparking rampant theories and speculation within the gaming community. Among the baseless rumors was the idea that the attack acted as a diversion for the theft of Ubisoft’s source code. Furthermore, worries circulated that players who used their newfound wealth would face bans, heightened by a pre-existing in-game ban ticker that issued alarming notices during the disorder.
When Ubisoft finally addressed these speculations, they reassured players that “nobody will be banned for spending credits received,” clarifying that the disturbing ban alerts were not issued by them. Nonetheless, the company also disclosed that all transactions made since 11 AM (UTC time) would be reversed, attempting to alleviate the negative consequences of the hack.
With the game offline for an extended duration, communication from Ubisoft fell silent once again for 21 hours, escalating player unease. Ubisoft returned to their X account on Sunday to notify players that *Rainbow Six Siege* would be restored to its pre-hack status, followed by thorough quality control assessments to guarantee account security and the efficacy of the implemented changes.
The team highlighted their dedication to quickly restoring game access, although no specific timeline was provided. Significant concern arose as the absence of ongoing updates left players uninformed, prompting a demand for improved communication during crises.
Roughly seven hours later, testing was completed, and a soft launch permitted a limited number of players to enter the game to check its stability. Ultimately, *Rainbow Six Siege* reopened to the general player base, though all changes from the hack were undone, including the removal of all transactions, both legitimate and otherwise. Ubisoft also cautioned that a small fraction of players might temporarily lose access to certain items as investigations continued in the upcoming weeks. The marketplace remains offline as the inquiry persists.
This incident marks a concerning repetition for *Rainbow Six Siege*, which has already encountered significant trials in 2025. A previous glitch involving prepaid cards had resulted in considerable financial losses for Ubisoft, and this recent holiday breach could lead to further difficulties for the company.
While the swift reaction to the hack, wrapping up within 48 hours, showcases Ubisoft’s commitment to tackling such disruptions, the inconsistency in communication remains a pivotal issue. This raises additional concerns about the security of *R6 Siege*, as the very possibility of this attack invites scrutiny over the game’s protective measures. Although there has been no confirmation regarding the potential theft of player account details, it is recommended for users to change their passwords. Moreover, information regarding the vulnerabilities exploited during this breach and assurances against future attacks has yet to be released.
No Comments
To comment you need to be logged in!