An internet leak is the unauthorized release of information over the
internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
. Various types of information and data can be, and have been, "leaked" to the Internet, the most common being personal information, computer
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
and
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
, and artistic works such as books or
album
An album is a collection of audio recordings (e.g., music) issued on a medium such as compact disc (CD), Phonograph record, vinyl (record), audio tape (like 8-track cartridge, 8-track or Cassette tape, cassette), or digital distribution, dig ...
s. For example, a musical album is leaked if it has been made available to the public on the Internet before its official release date.
Music leak
Source code leaks
Source code leaks are usually caused by misconfiguration of software like
CVS or
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and dat ...
which allow people to get source files through exploits, software
bugs, or employees that have access to the sources or part of them revealing the code in order to harm the company.
There were many cases of source code leaks in the history of software development.
*Developers may inadvertently leak source code by making mistakes when mastering. Two releases of ''
Space Quest II'' contained parts of the source code to Sierra's AGI game engine,
and a particular release of ''
Double Dragon II'' for the PC contained a deleted archive of the game source code.
*As
Fraunhofer IIS released in 1994 had a low quality version of their
MP3 encoding software (
l3enc), a hacker named SoloH gathered the
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
from the unprotected servers of the
University of Erlangen and developed a higher quality version, which started the MP3 revolution on the internet.
*Around 1996
Electronic Arts
Electronic Arts Inc. (EA) is an American video game company headquartered in Redwood City, California. Founded in May 1982 by former Apple Inc., Apple employee Trip Hawkins, the company was a pioneer of the early home computer game industry ...
accidentally put the source code of the video game ''
FIFA 97'' on the
demo disc.
*In 2003, Axel Gembe, a German
hacker
A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
, who had infiltrated
Valve's internal network months earlier, exploited a security hole in
Microsoft's Outlook to get the complete source of the video game ''
Half-Life 2''. The source code was leaked online a week later, a playable version of ''Half-Life 2'' was
compiled from the source code, revealing how unfinished it was. The leaks damaged morale at Valve and slowed development. In March 2004, Gembe contacted
Gabe Newell, CEO of Valve, and identified himself, saying he was a fan and had not acted maliciously. Newell worked with the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
to invite Gembe to a fake job interview, planning to have him arrested in the USA; however, police arrested him in Germany as they had already detected his actions.
The complete source was soon available in various
file sharing networks.
*Also in 2003, source code to
Diebold Election Systems Inc.
voting machine
A voting machine is a machine used to record votes in an election without paper. The first voting machines were mechanical but it is increasingly more common to use ''electronic voting machines''. Traditionally, a voting machine has been defi ...
s was leaked. Researchers at
Johns Hopkins University
The Johns Hopkins University (often abbreviated as Johns Hopkins, Hopkins, or JHU) is a private university, private research university in Baltimore, Maryland, United States. Founded in 1876 based on the European research institution model, J ...
and
Rice University
William Marsh Rice University, commonly referred to as Rice University, is a Private university, private research university in Houston, Houston, Texas, United States. Established in 1912, the university spans 300 acres.
Rice University comp ...
published a critique of Diebold's products, based on an analysis of the software. They found, for example, that it would be easy to program a
counterfeit
A counterfeit is a fake or unauthorized replica of a genuine product, such as money, documents, designer items, or other valuable goods. Counterfeiting generally involves creating an imitation of a genuine item that closely resembles the original ...
voting card to work with the machines and then use it to cast multiple votes inside the voting booth.
*In 2003 a Chinese hacker acquired the source code for ''
Lineage II'' and sold it to someone in
California
California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
who then used it to create a bootleg version of the game, powered by his own servers. Despite warnings from
NCSoft that pirating an online game was considered illegal, he continued doing so for a few years, until the
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
finally raided his home in 2007, seized the servers and permanently disabled the website that fronted his bootleg version of ''Lineage II''.
*In 2003, one year after
3dfx was bought by
Nvidia
Nvidia Corporation ( ) is an American multinational corporation and technology company headquartered in Santa Clara, California, and incorporated in Delaware. Founded in 1993 by Jensen Huang (president and CEO), Chris Malachowsky, and Curti ...
and support ended, the source code for their drivers leaked, resulting in
fan-made, updated drivers.
*In 2004, a large portion of the
Windows NT 4.0's source code and a small percentage (reportedly about 15%) of
Windows 2000
Windows 2000 is a major release of the Windows NT operating system developed by Microsoft, targeting the server and business markets. It is the direct successor to Windows NT 4.0, and was Software release life cycle#Release to manufacturing (RT ...
(formerly Windows NT)'s were leaked online. The Windows 2000 (NT) source code leak was analysed by a writer for (now defunct) website
Kuro5hin who noted that while the code was generally well written, it allegedly contained about "a dozen" instances of
profanity
Profanity, also known as swearing, cursing, or cussing, is the usage of notionally word taboo, offensive words for a variety of purposes, including to demonstrate disrespect or negativity, to relieve pain, to express a strong emotion (such a ...
and the milder
euphemism
A euphemism ( ) is when an expression that could offend or imply something unpleasant is replaced with one that is agreeable or inoffensive. Some euphemisms are intended to amuse, while others use bland, inoffensive terms for concepts that the u ...
"crap". The writer also noted that there were a lot of code hacks, with the "uglier" ones mostly being for compatibility with older programs and some hardware. It was feared that because of the leak, the number of security
exploits would increase due to wider scrutiny of the source code. It was later discovered that the source of the leak originated from
Mainsoft.
*Also in 2004, partial (800 MB) proprietary source code that drives
Cisco Systems
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develops, m ...
' networking hardware was made available in the internet. The site posted two files of source code written in the
C programming language, which apparently enables some next-generation
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
functionality. News of the latest source code leak appeared on a Russian security site.
*In 2006,
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
hackers stole source code (about 1 GiB) for
Symantec's
pcAnywhere
pcAnywhere is a discontinued suite of computer programs by NortonLifeLock, Symantec which allowed a user of the pcAnywhere remote program on a computer to connect to a personal computer running the pcAnywhere host if both are connected to interc ...
from the company's network. While confirmed in January 2012, it is still unclear how the hackers accessed the network.
*In late 2007, the source code of
Norton Ghost 12 and a
Norton Anti-Spyware version were available via
BitTorrent
BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
.
*In December 2007 and January 8, a
Pirate Bay user published the sources of five
Idera SQL products via BitTorrent.
*In January 2011 the "stolen source code" of
Kaspersky Anti-Virus 2008 was published on the Pirate Bay.
*On May 20, 2011, ''
EVE Onlines
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
was published by someone on a
GitHub
GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
repository. After being online for four days, CCP Games issued a
DMCA take-down request which was followed by GitHub.
*In 2011, the
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
of ''
GunZ: The Duel'' v1.5 became available online.
*In December 2011, the source code of the
Solaris 11 operating system's kernel was leaked via BitTorrent.
*In August 2014 ''
S.T.A.L.K.E.R.: Clear Skys
X-Ray Engine source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
(and its successor) became available on
GitHub
GitHub () is a Proprietary software, proprietary developer platform that allows developers to create, store, manage, and share their code. It uses Git to provide distributed version control and GitHub itself provides access control, bug trackin ...
under a non-
open-source license
Open-source licenses are software licenses that allow content to be used, modified, and shared. They facilitate free and open-source software (FOSS) development. Intellectual property (IP) laws restrict the modification and sharing of creative ...
.
*On December 29, 2015, the
AmigaOS
AmigaOS is a family of proprietary native operating systems of the Amiga and AmigaOne personal computers. It was developed first by Commodore International and introduced with the launch of the first Amiga, the Amiga 1000, in 1985. Early versions ...
3.1 source code leaked to the web, confirmed by the rights holder
Hyperion Entertainment.
*In January 2017 the source code of Opera's
Presto Browser engine was leaked to GitHub. The source code was shortly after taken down with a DMCA notice.
*In June 2017 a small part of Microsoft's
Windows 10
Windows 10 is a major release of Microsoft's Windows NT operating system. The successor to Windows 8.1, it was Software release cycle#Release to manufacturing (RTM), released to manufacturing on July 15, 2015, and later to retail on July 2 ...
source code leaked to the public. The leak was of the Shared Source Kit, a small portion of the source code given to
OEMs to help with writing drivers.
*In February 2018, the
iBoot bootloader for
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
operating systems' source code was leaked onto GitHub by an Apple engineer. The code was from 2016, and by the time it was leaked, iBoot had been restructured, making it obsolete.
*On April 22, 2020, ''
Counter-Strike: Global Offensive'' and ''
Team Fortress 2'' code was leaked.
* Some time during March 2018, Nintendo suffered a
significant leak when a hacker obtained an alleged 2 TB of confidential material containing source codes to game consoles, games, and internal documentation. Starting in 2018, the contents of this breach slowly made their way onto the Internet, starting with iQue Player ROMs and various
Pokémon
is a Japanese media franchise consisting of List of Pokémon video games, video games, Pokémon (TV series), animated series and List of Pokémon films, films, Pokémon Trading Card Game, a trading card game, and other related media. The fran ...
games. Later in 2020, the leaks gained more attention and grew in size, culminating into the release of Wii and Nintendo 64 source code, and the so-called "Gigaleak", a massive release containing multiple N64 games' source code and SNES Prototypes. After July 2021, no more releases have occurred.
* On August 7, 2020, 20 GB of
Intellectual property
Intellectual property (IP) is a category of property that includes intangible creations of the human intellect. There are many types of intellectual property, and some countries recognize more than others. The best-known types are patents, co ...
of
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
, including source code (in
SystemVerilog and otherwise) of their
system on chips leaked (with preserving
git structure). That included
Intel ME,
Intel Microcode and software simulators of their hardware. Their various BIOS source code was also leaked. The
SpaceX
Space Exploration Technologies Corp., commonly referred to as SpaceX, is an America, American space technology company headquartered at the SpaceX Starbase, Starbase development site in Starbase, Texas. Since its founding in 2002, the compa ...
cameras firmware that Intel worked on also leaked. The data is being distributed through a torrent.
* On September 23, 2020,
Windows XP
Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
SP1 and
Windows Server 2003
Windows Server 2003, codenamed "Whistler Server", is the sixth major version of the Windows NT operating system produced by Microsoft and the first server version to be released under the Windows Server brand name. It is part of the Windows NT ...
(notorious) complete source code depots were leaked. The archives included all the source code from the time it was used at
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
(notorious) , including documentation and build tools. The leak was first dismissed as illegitimate, but it was soon clear that it was legitimate, the source code contained Windows XP specific code and resources, later one user managed to compile the OS and pack it into an
ISO image.
*On January 4, 2021,
Nissan
is a Japanese multinational Automotive industry, automobile manufacturer headquartered in Yokohama, Kanagawa, Japan. The company sells its vehicles under the ''Nissan'' and ''Infiniti'' brands, and formerly the ''Datsun'' brand, with in-house ...
North America
North America is a continent in the Northern Hemisphere, Northern and Western Hemisphere, Western hemispheres. North America is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South Ameri ...
source code was leaked online due to misconfiguration of a company
Git server, which was left exposed online with a default username and password of admin/admin. Software engineer
maia arson crimew learned of the leak and analyzed the data, which they shared with
ZDNet. The repository reportedly contained
Nissan
is a Japanese multinational Automotive industry, automobile manufacturer headquartered in Yokohama, Kanagawa, Japan. The company sells its vehicles under the ''Nissan'' and ''Infiniti'' brands, and formerly the ''Datsun'' brand, with in-house ...
NA mobile apps, parts of the Nissan ASIST diagnostics tool, Nissan's internal core mobile library, Dealer Business Systems and Dealer Portal, client acquisition and retention tools, market research tools and data, vehicle logistics portal, vehicle connected services, and various other back ends and internal tools, they reported.
*On February 10, 2021, ''
Cyberpunk 2077'' and ''
Witcher 3'' developer
CD Projekt Red (CDPR) announced hackers had targeted the company and attempted to hold it to ransom. On 6 June 2021, someone in possession of the data had leaked all of ''Cyberpunk 2077'' code (96.02 GB of data in 7z archive) online publicly, while previously it was only available in encrypted form.
*On October 6, 2021, streaming site
Twitch had its source code along with earnings reports of top streamers leaked by hackers on
4chan, citing the streaming site's negative community and desire for competition and disruption of the online video streaming space. The breach was confirmed by Twitch on X. The leak was distributed freely via a
torrent file and was 135.17 GB in size. As a precaution, all the stream keys have been reset by Twitch.
*On February 25, 2022, ransomware group LAPSUS$ hacked
NVIDIA
Nvidia Corporation ( ) is an American multinational corporation and technology company headquartered in Santa Clara, California, and incorporated in Delaware. Founded in 1993 by Jensen Huang (president and CEO), Chris Malachowsky, and Curti ...
and reportedly obtained 1 TB of proprietary information. The group subsequently released a ~20 GB archive containing the source code for NVIDIA GPU drivers among other things. Details for a
Nintendo Switch
The is a video game console developed by Nintendo and released worldwide in most regions on March 3, 2017. Released in the middle of the Eighth generation of video game consoles, eighth generation of home consoles, the Switch succeeded the ...
successor (
Switch 2) were also found among the data. It was also reported recently that the group also infiltrated Portuguese media conglomerate Impresa, the Ministry of Health in Brazil and Brazilian telecommunications company Claro.
*On September 18, 2022, ''
Grand Theft Auto VI'' had a massive leak online, with 90 videos of the game being released. It was confirmed by a worker at Rockstar Games that the leak was real. The content of the leak received mixed reviews, with many calling the game unfinished and rushed, but many criticized these complaints by stating the game was not near completion. The leak itself, however, received negative reception, with many claiming it discredited the work of several employees. Publisher TakeTwo began taking down leaks on several different websites. Rockstar issued a statement on September 19, which stated they were "disappointed" with the leak.
** The hacker who got the leak also got the source code for ''
Grand Theft Auto V
''Grand Theft Auto V'' is a 2013 action-adventure game developed by Rockstar North and published by Rockstar Games. It is the seventh main entry in the Grand Theft Auto, ''Grand Theft Auto'' series, following 2008's ''Grand Theft Auto IV'', and ...
'', and announced he would be selling both. Shortly after, he announced the ''GTA VI'' source code was no longer for sale, but was still selling the ''GTA V'' source code. This has been considered a form of blackmail. Not long afterwards, the hacker was arrested by the
City of London Police on 22 September as part of an investigation supported by the
National Cyber Crime Unit and American federal law enforcement, with his devices seized.
*On January 25, 2023, leaked
archive
An archive is an accumulation of historical records or materials, in any medium, or the physical facility in which they are located.
Archives contain primary source documents that have accumulated over the course of an individual or organ ...
with approx. 44 GB of
Yandex services has been published on Torrents.
End-of-life leaks by developers
Sometimes software developers themselves will intentionally leak their source code in an effort to prevent a software product from becoming
abandonware
Abandonware is a term for software, typically video games, that are no longer for sale by conventional means and are distributed by warez websites for free. The use of the "abandonware" term is controversial, as distributing out-of-print softw ...
after it has reached its
end-of-life, allowing the community to continue development and support. Reasons for leaking instead of a proper release to
public domain
The public domain (PD) consists of all the creative work to which no Exclusive exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly Waiver, waived, or may be inapplicable. Because no one holds ...
or as
open-source can include scattered or lost
intellectual property rights. An example is the
video game
A video game or computer game is an electronic game that involves interaction with a user interface or input device (such as a joystick, game controller, controller, computer keyboard, keyboard, or motion sensing device) to generate visual fe ...
''
Falcon 4.0''
which became available in 2000; another one is ''
Dark Reign 2''.
Other leaks
* In late 1998, a number of confidential
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
documents later dubbed the ''
Halloween documents'' were leaked to
Eric S. Raymond, an activist in the
open-source software
Open-source software (OSS) is Software, computer software that is released under a Open-source license, license in which the copyright holder grants users the rights to use, study, change, and Software distribution, distribute the software an ...
movement, who published and commented on them online. The documents revealed that internally Microsoft viewed free and open-source software such as
Linux
Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
as technologically competitive and a major threat for Microsoft's dominance in the market, and they discussed strategies to combat them. The discovery caused a public controversy. The documents were also used as evidence in several court cases.
*
Nintendo
is a Japanese Multinational corporation, multinational video game company headquartered in Kyoto. It develops, publishes, and releases both video games and video game consoles.
The history of Nintendo began when craftsman Fusajiro Yamauchi ...
's crossover fighting video game series ''
Super Smash Bros.'' has a history of having unconfirmed content leaked. Every game since, including 2008's ''
Super Smash Bros. Brawl'' has been affected by leaks in some form:
**''Super Smash Bros. Brawl'' for the
Wii was leaked by a video on the
Japanese language
is the principal language of the Japonic languages, Japonic language family spoken by the Japanese people. It has around 123 million speakers, primarily in Japan, the only country where it is the national language, and within the Japanese dia ...
wii.com website, revealing unconfirmed playable characters on January 28, 2008 (three days before the game's Japanese release).
**''
Super Smash Bros. for Nintendo 3DS and Wii U'' was afflicted in August 2014 by the "ESRB leak", where many screenshots and limited video footage of the 3DS version were leaked by a supposed member of the
ESRB. The leak gained traction very quickly due to the screenshots mostly containing elements that the game ratings board would be interested in, such as trophies of suggestively-dressed female characters (some of which were later found to be edited or cut altogether in the final game).
**''
Super Smash Bros. Ultimate'' was leaked in its entirety two weeks before its release, allowing many to play and datamine in advance. While the entire roster of characters and stages had already been officially revealed, many unrevealed collectibles, music tracks, and story elements were discovered and distributed. This prompted Nintendo to issue copyright strikes to many YouTube and Twitch channels.
*November 2009:
Climatic Research Unit email leak, aka Climategate
* Several high-profile books have been leaked on the Internet before their official release date, including ''
If I Did It'', ''
Harry Potter and the Deathly Hallows
''Harry Potter and the Deathly Hallows'' is a fantasy novel written by British author J. K. Rowling. It is the seventh and final novel in the ''Harry Potter'' series. It was released on 21 July 2007 in the United Kingdom by Bloomsbury Publish ...
'', and an early draft of the first twelve chapters of ''
Midnight Sun
Midnight sun, also known as polar day, is a natural phenomenon that occurs in the summer months in places north of the Arctic Circle or south of the Antarctic Circle, when the Sun remains visible at the local midnight. When midnight sun is see ...
''. The leak of the latter prompted the author
Stephenie Meyer
Stephenie Meyer (; Morgan; born December 24, 1973) is an American novelist and film producer. She is best known for writing the vampire literature, vampire romance series ''Twilight (novel series), Twilight'', which has sold over 160 million ...
to suspend work on the novel.
* 2010 ''
My Little Pony: Friendship Is Magic'' has been filled with lot of leaks for later seasons on scenes, leaked full song to the theme song, leaked early released episodes before they got aired on
Discovery Family, unfinished episodes, 2018–present there was leaks for the generation 5 as ''
My Little Pony: A New Generation'' was the start.
* On January 31, 2014, the original uncensored version of the ''
South Park
''South Park'' is an American animated sitcom created by Trey Parker and Matt Stone, and developed by Brian Graden for Comedy Central. The series revolves around four boysStan Marsh, Kyle Broflovski, Eric Cartman, and Kenny McCormickand the ...
'' episode "
201" was leaked, when it was illegally pulled from the South Park Studios servers and was posted online in its entirety without any approval by
Comedy Central
Comedy Central is an American Cable television in the United States, cable television channel, channel owned by Paramount Global through its Paramount Media Networks, network division's Paramount Media Networks#MTV Entertainment Group, MTV Ente ...
. The episode was heavily censored by the network when it aired in 2010 against the will of series creators
Trey Parker and
Matt Stone
Matthew Richard Stone (born May 26, 1971) is an American actor, animator, writer, producer, and musician. He is best known for co-creating ''South Park'' (since 1997) and ''The Book of Mormon (musical), The Book of Mormon'' (2011) with his cre ...
, and was never formally released uncensored to the public. The episode was the second in a
two parter and was censored after the airing of the
first part as a result of
death threats
A death threat is a threat, often made Anonymity, anonymously, by one person or a group of people to kill another person or group of people. These threats are often designed to intimidate victims in order to Psychological manipulation, manipulat ...
from
Islamic extremists who were angry of the episode's storyline satirizing censorship of
depictions of Muhammad.
* In 2015, the unaired ''
Aqua Teen Hunger Force'' episode "Boston" was leaked online. The episode was set to air during the
fifth season as a response to a controversial
publicity stunt for ''
Aqua Teen Hunger Force Colon Movie Film for Theaters''
that occurred in the titular city, but
Adult Swim
Adult Swim (stylized as dult swimand s is an American adult-oriented television programming block that airs on Cartoon Network which broadcasts during the evening, prime time, and Late-night television, late-night Dayparting, dayparts. T ...
was forced to pull it to avoid further controversy.
* On March 13, 2016, the full list of qualifying teams and first round match-ups for the
2016 NCAA Men's Division I Basketball Tournament leaked on Twitter in the midst of a television special being broadcast by
CBS to officially unveil them. The leak exacerbated criticism of a new, two-hour format for the selection broadcast, which was criticized for revealing the full tournament bracket at a slower pace than in previous years.
* On April 20, 2021,
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
supplier
Quanta Computer was hit by a ransomware attack. The attackers began posting documents and schematics of
MacBook computer designs as recent as March 2021. The attackers threatened to release everything they had obtained by May 1, 2021, unless a ransom had been paid, however nothing further came out of the breach.
* On March 6, 2023, the unreleased film ''Scooby-Doo! and Krypto, Too!'', a crossover involving
Scooby-Doo and
Krypto the Superdog was allegedly canceled,
and was leaked online. It was
alleged to be cancelled as
tax write-off for parent company
Warner Bros. Discovery's cost savings effort.
On July 26, 2023, it was confirmed to not be cancelled, and a trailer was released on July 27, 2023 with a release date of September 26, 2023.
* On May 6, 2023, a Twitter user leaked the trailer for the ''
Five Nights at Freddy’s'' film.
Universal Pictures
Universal City Studios LLC, doing business as Universal Pictures (also known as Universal Studios or simply Universal), is an American filmmaking, film production and film distribution, distribution company headquartered at the 10 Universal Ci ...
and
Blumhouse worked to have videos of the trailer taken down.
* On January 3, 2024, a Twitter user leaked the screenshots of 3 new minions and the plot for ''
Despicable Me 4'' weeks before the trailer launched and was claimed that it would appear at
Super Bowl LVIII but screenshots were taken down by Universal and Illumination. Only two descriptions of the plot leak was confirmed true, while the third was false for Edith, Agnes and Margo were going to be ''teenagers''. The trailer was released on January 28, 2024.
* On September 18, 2024, an image of a
Nintendo Switch 2
The is a hybrid video game console developed by Nintendo, released in most regions on June5, 2025. Like the original Nintendo Switch, Switch, it can be used as a Handheld game console, handheld, as a Tablet computer, tablet, or connected via ...
factory unit was posted online onto a Chinese website alongside a few CAD mockups of the console. When the Nintendo Switch 2 was revealed on January 16, 2025, the factory unit ended up being confirmed as true.
* In March of 2025, the
United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
arrested Steven R. Hale, an employee of a multinational DVD company. Hale allegedly leaked the
Blu-ray
Blu-ray (Blu-ray Disc or BD) is a digital optical disc data storage format designed to supersede the DVD format. It was invented and developed in 2005 and released worldwide on June 20, 2006, capable of storing several hours of high-defin ...
s of the following titles;
F9: The Fast Saga,
Venom: Let There Be Carnage,
Godzilla vs. Kong,
Shang-Chi and the Legend of the Ten Rings,
Dune
A dune is a landform composed of wind- or water-driven sand. It typically takes the form of a mound, ridge, or hill. An area with dunes is called a dune system or a dune complex. A large dune complex is called a dune field, while broad, flat ...
, and
Black Widow.
See also
*
Distributed Denial of Secrets
*
GlobaLeaks
*
News leak
A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of a ...
*
Nikki Catsouras photographs controversy, a 2006 California case in which police photographs of a fatal automobile accident were leaked online
*
royaldutchshellplc.com
*
Software release life cycle
The software release life cycle is the process of developing, testing, and distributing a software product (e.g., an operating system). It typically consists of several stages, such as pre-alpha, alpha, beta, and release candidate, before the fi ...
*
War Thunder classified documents leaks
*
WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
References
{{Reflist, 30em
Internet terminology
Intellectual property law
Internet trolling
Internet leaks