Nintendo server attacked by hacking group Lulz Security

Model holding Nintendo 3Ds Gaming console makers have been the target of attacks by hacking group Lulz security

Related Stories

Nintendo has become the latest company to suffer an online security breach due to an attack by hackers, Lulz Security.

The Japanese game company said that a server of one of its affiliates in the US was attacked by the group some weeks ago.

Lulz Security is the same group that attacked the websites of Sony over the past few weeks.

However, the maker of the Wii said that no consumer data or company information was lost.

"There were no third-party victims," company spokesman Ken Toyoda said.

"But it is a fact, there was some kind of possible hacking attack," he added.

'Utmost priority'

Over the past few months, there has been a spate of attacks by hackers on the websites of leading companies resulting in the loss of valuable consumer data.

Japanese electronics maker Sony suffered a massive security breach earlier this year when hackers targeted the PlayStation Network and the details of 77 million users were compromised.

However in this case, Nintendo says there was no consumer data stored on the server accessed by the hackers and the company insists it is constantly working to ensure consumer safety.

"The protection of our customer information is our utmost priority," said Tomokazu Nakaura of Nintendo Japan.

"Therefore, we constantly monitor our security," he added.

More on This Story

Related Stories

More Business stories


Features & Analysis

Elsewhere on the BBC

  • ReadingBest books

    BBC Culture takes a look at ten books you should read in February


  • A car being driven by Cruise Automation technologyClick Watch

    The tech which could allow any car with an automatic gearbox to become self-driving

Copyright © 2015 BBC. The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.