Valve Confirms The CS:GO & Team Fortress 2 (TF2) Source Code Leaked

The source code of CS:GO (Counter-Strike Global Offensive) and Team Fortress 2 source code leaked on 4chan late Tuesday. Amid worries that hackers could find exploits and deliver malware through Remote Code Execution to other players. Due to a recent leak, some services were closed as a precaution.

Also Read: 4 Million Quidd User’s Credentials Dumped on Dark Web And Shared on Hacking Forum

Due to the leak, Valve released their own statement on Twitter,

Valve advises players to stick to official servers and to pushing further updates if any exploits released by hackers or remote code executions.

The leaked were published on Reddit by the handler u/iShaugrrz with a screenshot displaying several compressed files. He claimed to have unreleased source mod inside this torrent and source code of Operation Hydra and TF2 code as of Jungle Inferno.

Valve Confirms The CS:GO & Team Fortress 2 (TF2) Source Code Leaked

Is it dangerous?

We have to reiterate that reports of Remote Code Execution in TF2 (Team Fortress 2) and other Valve games have been unconfirmed. As the source code is leaked “It is an older version and was initially leaked about two years ago.” And it’s not possible for the security flaws such as Remote Code Executions and other exploits to exist. If there’s any RCE or any exploit exists Valve will push updates as you need to keep your games updated.

Who was behind this leak?

It’s still unclear who was behind this leak, But a Youtuber gamer “mbhound” from Valve News Network, led by Tyler McVicker says, that they are “a small team dedicated to bringing Valve’s interesting unused assets and canceled projects to the public for viewing and playing.” Jaycie Erysdren was a developer on the team and told Newsweek that “[Maxx’s] problematic behavior was actively contributing to the decline of work being done by the other members.”

Noor Qureshi

Experienced Founder with a demonstrated history of working in the computer software industry. Skilled in Network Security and Information Security.

Related Articles

Back to top button