When Your Cloud Monitor Becomes the Backdoor: The Rockstar–Anodot–Snowflake Chain
ShinyHunters didn’t break Snowflake’s security — they walked around it. Here’s exactly how, and what Rockstar confirmed.
On April 11, 2026, hacking group ShinyHunters posted on its dark web leak site claiming it had accessed Rockstar Games‘ Snowflake cloud environment — with a ransom deadline set for April 14. Rockstar confirmed the same day that a “limited amount of non-material company information” was accessed through a third-party breach. No player data or passwords are believed to have been compromised. The stated entry point was Anodot — a SaaS cloud cost monitoring and analytics platform connected to Rockstar’s Snowflake environment. This appears to be part of a wider campaign in which ShinyHunters has targeted companies through third-party cloud integrations, with the group having previously claimed access to data from over 400 companies via Salesforce in March 2026. Below is an interactive breakdown of the attack chain, key facts, and the full timeline.
The incident was reported after Rockstar Games confirmed its systems were accessed through a third-party data breach. The company’s statement described the data as limited and non-material, with no impact on players or internal operations. ShinyHunters’ April 14 ransom deadline was covered across cybersecurity and gaming outlets. Rockstar’s previous major breach occurred in September 2022, when Lapsus$ member Arion Kurtaj accessed the company’s internal Slack channel using an Amazon Fire Stick and leaked over 90 GTA VI development clips. Kurtaj received an indefinite hospital order from a UK court in December 2023.
The 2026 breach involved no direct attack on Rockstar’s systems or on Snowflake‘s own infrastructure. Access was obtained through authentication tokens extracted from Anodot, a third-party cloud monitoring platform Rockstar used. Further reading: Samson PC Launch — Liquid Swords | PS6 Device Leak Details.