ArrowheadDude
18.3K posts

ArrowheadDude
@ArrowheadDude
My Name Is Anthony And I Love To Game On Twitch And Give Positivity To The World Of Social Media! Come Check Me Out Sometime! https://t.co/WlMjM3pFMk
Katılım Haziran 2012
3.4K Takip Edilen1.1K Takipçiler

@ByteStix @IntCyberDigest If they attack WUWA Next Its GGs for us all
English

@IntCyberDigest CHANGE YOUR PASSWORDS!
First Duet Night Abyss, then Reverse 1999's YT channel, then Tower of Fantasy, then Duet Night Abyss a 2nd time, then Warframe, now Crunchyroll?
What a year so far.
English

🚨‼️ BREAKING: Crunchyroll breached through outsourcing partner in India.
A threat actor exfiltrated data from Crunchyroll's ticketing system and also managed to pull 100 GB of personally identifiable customer analytics data.
We've analyzed sample data and it includes IP addresses, email addresses, credit card details, and more.
An employee of their outsourcing partner Telus had executed malware on his system, which gave a threat actor access to Crunchyroll's environment.


English

@DNAbyss_EN took 5 years to make a livestream hopefully it brings 30 thousand people back to this game
English

✦ Duet Night Abyss | The Firmament Unbound Preview Livestream
The New Huaxu Chapter: The Firmament Unbound Preview Livestream goes live on March 27 at 7:00 PM (UTC+8).
Phoxhunters, we'll see you there!
✦ Download Duet Night Abyss
bit.ly/4qpfs9n
#DuetNightAbyss #Huaxu #TheFirmamentUnbound

English

@DNAbyss_EN this is a somewhat fraction percentage of a decent response but reguardless most people like me are prob giving you 1 more strike before the entire world of people call it quits here. If you get hacked for the 3rd time in a short period im pretty sure rest of us will uninstall
English

Official Statement Concerning the March 18 External Malicious Attack
Dear Phoxhunters,
First and foremost, we would like to express our deepest apologies for the cybersecurity incident that occurred yesterday. Following the resolution of these temporary issues, we have conducted a full review and summary of the event. We are providing the following timeline of the March 18 incident for your reference:
17:04 (UTC+8): A hotfix was deployed to resolve known online issues.
17:24 (UTC+8): Received feedback regarding login failures on Global servers; the development team began investigating the cause.
17:28 (UTC+8): Received feedback regarding login failures on the CN server, along with reports of malicious files being automatically downloaded onto PCs.
17:40 (UTC+8): Identified the root cause; began repair work and a wider-range security audit.
18:20 (UTC+8): Login services restored for PC and mobile on the CN server.
18:24 (UTC+8): Login services restored for PC and mobile on Global servers.
18:28 (UTC+8): Received user feedback that malicious files still remained on PCs and inquiries regarding account security.
19:38 (UTC+8): Emergency update deployed to remove the malicious files via the update process.
The root cause of this incident was a malicious attack originating from a specific region, targeting our internal office systems and live servers. Even after the initial breach, persistent attempts to continue the attack and spread misinformation have occurred. We strongly condemn these actions. As security is a vital pillar of a live product, this incident has served as a serious wake-up call for our team.
We sincerely apologize for not providing a full response on the day of the incident. We wanted to ensure a complete review of the problem and finalize our security measures before providing a detailed explanation to the community.
To better defend against future malicious attacks, the development team has implemented the following security enhancements:
1. Real-time Monitoring & Tampering Alerts: We have deployed a real-time monitoring and tampering alert system for core file systems. Any unauthorized access or attempted modification of game resources will trigger an immediate alert, ensuring we can detect and block abnormal behavior instantly.
2. Minimized Network and Access Control: We have conducted a thorough audit and restriction of all ports and paths used for external access to sensitive files. Following the "Principle of Least Privilege," we have closed all non-essential access channels to fundamentally improve file confidentiality and storage security.
3. Hardening of Sensitive File Ports: All external access ports have been strictly consolidated. By adhering to rigorous cybersecurity protocols, we have closed non-essential communication ports and access paths to build a more robust defensive perimeter for core files and sensitive assets.
4. Server-Wide Compensation
a. Compensation: Commission Manual: Volume III*5, Prismatic Hourglass*10
b. Distribution Time: March 19, 2026, 18:00 (UTC+8)
c. Eligibility: Unlock the [Mail] function. The mail is valid for collection until March 26, 2026, 23:59 (UTC+8).
The development team sincerely apologizes for the inconvenience and concern this incident has caused to players worldwide. We understand that apologies and compensation cannot immediately bridge the gap in trust; therefore, we humbly ask for your patience as we work to provide continuous, stable service to every player.
If you have any remaining questions regarding the impact of this incident, please contact us via Customer Service: dna_cs@dna-panstudio.com
Duet Night Abyss Team

English

twitch.tv/arrowheaddude Playing More Valheim Cus Why Not!??
English

@DNAbyss_EN Guys I know this game is in a dogshit state but it doesn’t deserve to be hacked twice 😭😭
English

Regarding Abnormal Game Login Issues
Dear Phoxhunter,
The login issues occurring after the March 18 game update have now been resolved as of March 18, 2026, 18:24 (UTC+8). You may now log in normally. We sincerely apologize for the inconvenience caused. Thank you for your support and understanding of Duet Night Abyss!
Compensation: Phoxene ×100
How to claim: Unlock [Mail] function
Compensation emails are valid until March 18, 2026, 23:59 (UTC+8).
Duet Night Abyss Team

English
