UPDATE 11/2/21: The auction of stolen CD Projekt source code has been closed, a report from darknet intel service KELA has now claimed, as a "satisfying offer" was accepted. It's not clear how much the source code was sold for, though the purchaser is said to have paid enough they could stipulate the data would not be distributed or sold further.
Earlier this week, CD Projekt said it would not participate with ransom demands or negotiate to regain its data.
ORIGINAL STORY 10/2/21: Stolen source code for Cyberpunk 2077, free-to-play card-battler Gwent, and an unreleased version of The Witcher 3 are reportedly already up for auction after developer CD Projekt refused to cave in to ransom demands by hackers following a breach of its servers.
Yesterday, CD Projekt released a statement claiming an "unidentified actor" had gained unauthorised access to its internal network over the weekend and collected a range of data. A note accompanying the attack gave the developer 48 hours to "come to an agreement" regarding source code and documents - relating to accounting, administration, legal, HR, and investor relations - stolen from its servers, otherwise it would begin to sell or leak them online.
For its part, CD Projekt pledged it would "not give in to the demands nor negotiate with the actor, being aware that this may eventually lead to the release of the compromised date." It also said it was taking "necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected."
With 48 hours now lapsed, however, it appears hackers are readying to make good on their word. Tom's Hardware is reporting (based on information from vx-underground) that source code samples for Gwent have already been leaked online, with full code - alongside that of Cyberpunk 2077 and unreleased, possibly next-gen-related files for The Witcher 3 - set to be auctioned later today. The starting bid for the complete cache is set at $1,000 USD.
CD Projekt is yet to respond to this latest development, but did recommend former employees take precautions following the leak in an update tweet posted last night. "As of this moment," it noted, "we don't possess evidence that any of your personal data was accessed".