Hacker Who Leaked GTA 6 Sentenced to Life in Psychiatric Hospital
by Scott
An 18-year-old hacker behind one of the biggest video game leaks in history – the premature reveal of Grand Theft Auto VI – has been ordered to spend an indefinite period in a secure psychiatric hospital. Arion Kurtaj, a British teenager from Oxfordshire, was a key member of the infamous Lapsus$ hacking group. In a dramatic cybercrime case blending high-tech mischief and legal complexity, Kurtaj managed to infiltrate Rockstar Games (the developer of GTA) using only a cheap Amazon streaming gadget and a hotel TV. He stole and leaked confidential footage of the unreleased game, then tried to extort the company. Now, due to his mental health and the severity of his actions, he faces what is effectively a life sentence in a psychiatric facility unless doctors decide he is no longer a danger.
Who is Arion Kurtaj? Kurtaj was relatively unknown outside of hacking circles until recently, but he had already built a reputation in the cyber underground. He and a small circle of fellow teenagers operated under the banner of Lapsus$, an international hacking collective responsible for breaches at major tech companies. Even before the Grand Theft Auto VI incident, Kurtaj had allegedly been involved in cyberattacks on firms like Nvidia (stealing a trove of data from the chipmaker), Uber, and the British telecom providers BT and EE. In one 2021 case, Lapsus$ hackers accessed a telecom company’s systems and blasted out ransom demands to its customers, demonstrating both boldness and a desire for profit. Kurtaj’s skill with computers was evident from a young age – his father once noted the boy spent “a lot of time on the computer” and was exceptionally talented. However, Kurtaj also has severe autism, a condition which later played a significant role in how the courts dealt with him. He attended a special educational program due to his autism. Ironically, his identity as a hacker was unmasked not by police initially, but by rival hackers: after some internal disputes, other hackers doxxed Kurtaj online, publishing his name and address. This tipping-off led British police to arrest him in early 2022. Despite being just a teenager, he was becoming known as the “mastermind” of Lapsus$ – or at least one of its most prodigious members – orchestrating attacks on high-profile targets.
How the GTA VI Hack Happened – A Firestick, a Phone, and a Slack Break-In: The breach of Rockstar Games in September 2022 is almost unbelievable for how low-tech the setup was. At the time, Arion Kurtaj was actually out on police bail for his earlier hacking charges. As part of his bail conditions, he was banned from using the internet, and his laptop and other devices had been confiscated by authorities. In fact, for his own safety (given his identity was leaked and he might be targeted by others), he was being housed in a Travelodge hotel under police protection. Yet none of those measures stopped Kurtaj from executing another major hack. Armed with an Amazon Fire TV Stick – a small streaming device anyone can plug into a TV – and his smartphone, he turned his hotel room television into a hacking workstation. With this improvised setup, Kurtaj found a way back online. He paired the Fire Stick with a keyboard and mouse and connected it to the hotel Wi-Fi (or possibly tethered through his phone). This clever workaround gave him a functioning computer environment hidden in plain sight.
Using the Fire Stick and TV, Kurtaj managed to access Rockstar Games’ internal systems. According to reports later revealed in court, he infiltrated Rockstar’s company Slack workspace – the internal messaging and collaboration platform used by employees. Gaining access to an employee Slack account was a critical stepping stone. How did he do it? Investigators believe Kurtaj employed classic social engineering tactics, similar to methods Lapsus$ used on other victims. In other words, he likely tricked someone into giving up credentials or bypassing security. For example, in a separate hack on Uber just days earlier, the same hacker had obtained a contractor’s password (possibly bought from the dark web after malware theft) and then bombarded the person with login verification requests until they accidentally approved access – a technique known as “MFA fatigue”. He may have used a comparable strategy on Rockstar: perhaps phishing an employee with a fake login page or conducting a phone scam to persuade an IT helpdesk to reset credentials. Lapsus$ was also notorious for SIM swapping (hijacking phone numbers to intercept login codes) and even bribing insiders for access. One way or another, Kurtaj obtained the keys to Rockstar’s kingdom.
Once inside Rockstar’s Slack channel, Kurtaj moved quickly. He discovered that developers had been sharing confidential development footage of Grand Theft Auto VI on Slack, likely for work collaboration. He grabbed these files – ultimately downloading 90 video clips of the in-progress game, totaling about 50 minutes of unreleased gameplay. He also apparently accessed Rockstar’s internal Confluence wiki or other servers, because he obtained source code or code fragments for both GTA V (the previous game) and the in-development GTA VI. This was highly sensitive intellectual property. Having collected these digital assets, Kurtaj then decided to announce his presence with a bold message. Using the compromised Slack account, he posted an alert to Rockstar staff that read along the lines of: “If Rockstar does not contact me on Telegram within 24 hours, I will start releasing the source code.” In other words, he openly blackmailed the company from within their own communication channel. It’s hard to imagine the shock waves that message must have sent through Rockstar’s team early that morning.
When no immediate payoff or response came, the hacker followed through on his threat. Under the alias “teapotuberhacker” (a handle referencing the fact he also claimed responsibility for the Uber breach), Kurtaj went to a public GTA fan forum and began posting some of the stolen content. On 18 September 2022, he leaked dozens of video clips showing GTA VI development footage. These clips spread like wildfire across the internet – YouTube, Twitter, Reddit – and gaming fans around the world were suddenly watching an early, janky version of one of the most anticipated games ever. The footage, with its unfinished graphics and debug code overlays, confirmed several long-rumored details about GTA VI, such as the presence of a female protagonist and a setting that resembled modern-day Vice City (a fictional Miami). In terms of gaming news, this was an earthquake; never before had so much pre-release material from a top-tier game been exposed in one go. In addition to the videos, Kurtaj also posted snippets of source code from GTA V and possibly GTA VI as proof that he had the code in hand. He then indicated he was looking to “negotiate a deal” with Rockstar – essentially holding the rest of the data hostage unless the company met his demands. While he didn’t state a dollar amount publicly in that forum post, the implication was clear: pay up or risk a full leak of the source code.
Why Did He Do It? The motivations behind Kurtaj’s attack on Rockstar appear to be a mix of financial gain and notoriety. Lapsus$, as a group, had a pattern of infiltrating big companies and then attempting to extort money or favors. For instance, when they hacked Nvidia earlier in 2022, they not only stole a trove of data but also demanded that Nvidia pay a ransom and even cheekily asked Nvidia to remove certain software limitations on their graphics cards. In the case of Rockstar’s GTA 6, Kurtaj was likely hoping for a large ransom payout. The video game’s source code would be worth a fortune on the black market – or extremely costly to Rockstar if it were released, as it could enable cheats, leaks of content, or even pirated versions of the game. By threatening to dump the code publicly, he was putting enormous pressure on the company. Beyond money, however, there was also an element of showing off. Within the hacker community (and perhaps in his own mind), pulling off a breach of this magnitude would elevate his reputation. Leaking the crown jewels of Rockstar Games guaranteed him a sort of fame – or infamy – among peers. It’s also possible that Kurtaj, who had already been deeply involved in other hacks, was driven by the thrill and challenge. Notably, psychologists would later observe that due to his autism, he might not have fully grasped the consequences or simply was single-mindedly fixated on hacking as an obsessive interest. Indeed, after his arrest, doctors said he remained “highly motivated” to continue hacking, almost like an addiction. So, in short, he did it for money, clout, and because he could.
What Exactly Was Leaked? In the GTA VI incident, the leak consisted primarily of pre-release game footage and potentially some game code. The 90 video clips stolen from Rockstar’s development servers showed gameplay scenes under development. Viewers saw rough versions of character animations, test scenarios like a robbery at a diner, and various environments in the game’s world. Even though the graphics and models were unfinished, the videos were enough to excite (and sometimes mislead) the public about what the next GTA installment would be like. Rockstar Games quickly confirmed the authenticity of the footage after it spread online. Alongside the clips, Kurtaj also claimed to have obtained the source code for GTA VI and GTA V. The source code is essentially the programming code that underlies the game – a hugely sensitive asset. If a complete source code were leaked, it would be a nightmare for Rockstar: it could reveal exactly how the game works, allow hackers to find vulnerabilities or create unofficial versions, and expose proprietary tools and techniques that Rockstar spent years developing. In reality, it appears Kurtaj did not dump the entirety of the source code online (thankfully for Rockstar). He did, however, post fragments or screenshots of code as proof and was clearly willing to leak more. He tried to use this as leverage to make Rockstar negotiate. Meanwhile, Rockstar’s parent company took swift action on the legal front – issuing DMCA takedown notices to get the videos pulled off platforms and scrubbing forums of any links. The leaked material undoubtedly caused major headaches at Rockstar. The company later said that, while extremely unfortunate, the leak would not derail development. (Indeed, over a year later in late 2023, Rockstar released an official GTA VI trailer to enormous fanfare, proving that the hype survived the incident.)
How the Hacker Was Caught: Kurtaj’s GTA6 caper didn’t last long. The City of London Police, who had been investigating the Lapsus$ group, moved quickly once the Rockstar breach became public. Given that Kurtaj was already a suspect and, incredibly, was supposed to be under watch in that hotel, it likely didn’t take long for the authorities to pin this new breach on him. In fact, when officers raided his hotel room in late September 2022, they reportedly “caught him red-handed” – he was found in the act, with the Amazon Fire TV Stick still plugged into the TV, connected to what he shouldn’t have. This was a blatant violation of his bail, so he was immediately taken back into custody. From that point on, Kurtaj remained in detention as the legal case against him and a 17-year-old co-conspirator wound through the courts. Investigators pieced together evidence of the hacks on Rockstar, Uber, Nvidia, and others, tying them to Kurtaj and his online personas. It became clear that these were not random one-off incidents but part of a hacking spree that spanned August 2020 to September 2022, affecting multiple companies and causing millions in damages. Rockstar Games later testified that recovering from the GTA6 attack alone cost them over $5 million and countless hours in shoring up security and investigating the breach.
The Trial – Unfit to Plead, But Found Responsible: The legal proceedings for Arion Kurtaj were unusual. Because of his mental health status (severe autism) and his behavior in custody, questions arose about whether he was fit to stand trial in the normal sense. A psychiatric evaluation concluded that Kurtaj did not fully comprehend the ramifications of the court process and would not be able to participate effectively in his defense. In the UK justice system, when a defendant is deemed unfit to plead or stand trial, the court can hold a special hearing where a jury simply determines whether the person did the acts they are accused of, without assigning criminal intent. That’s exactly what happened in Kurtaj’s case. In August 2023, a jury at Southwark Crown Court heard the evidence of his hacking activities. They were not asked to decide if he was “guilty” in the usual sense – since intent was not evaluated – but rather to answer the question: did he actually commit these acts? The jury was convinced by the evidence and found that Kurtaj was responsible for 12 hacking-related offenses. These included multiple counts under the Computer Misuse Act (Britain’s main cybercrime law) for unauthorized access and operations, as well as charges of fraud and blackmail (for the extortion attempts). A second teenager, only 17 and also a member of Lapsus$, was tried alongside him; that teen was found guilty of a handful of related offenses (including aiding in the Nvidia hack and some fraud) and would face a separate sentencing as a juvenile.
Sentencing – Life in a Psychiatric Hospital: After the jury’s findings, a sentencing hearing was held in December 2023. Given Kurtaj’s mental health condition and the fact he was unfit for a normal trial, the judge had limited options. The court could not, for instance, simply send him to prison for a long term, because legally he hadn’t been convicted in the standard way due to lack of mens rea assessment. Instead, the judge opted to issue a “restricted hospital order” under the Mental Health Act. This is essentially an indefinite commitment to a secure psychiatric hospital. In practical terms, it means Kurtaj is to be confined in a high-security mental health facility – not a prison, but a hospital that also has locked wards and guards – for as long as necessary to protect the public and treat his condition. There is no fixed release date; he will remain there until doctors and a special tribunal decide that he is no longer a danger to society. If that day never comes, he could spend the rest of his life hospitalized. Media headlines called it a “life sentence in hospital,” and indeed it has a similar effect to a life prison sentence, except with an emphasis on psychiatric care and the slim possibility of release if his condition improves sufficiently.
Why such a harsh outcome? The judge noted several factors that made this necessary. First, the sheer scale and audacity of his crimes: hacking multiple major companies, attempting to blackmail them, and even after being caught once, immediately reoffending on bail. Second, Kurtaj’s behavior while in custody had been alarming – records show he had been violent in detention, with numerous incidents of attacking people or destroying property, suggesting he had difficulty controlling himself. Third, and perhaps most importantly, mental health assessors testified that Kurtaj showed no remorse or intention to stop his hacking. In fact, he apparently told doctors that he would go right back to cybercrime if given the chance. The judge concluded that Kurtaj remained “determined to commit further serious offenses if the opportunity arose.” This painted the picture of someone who was both unwilling and perhaps unable to adhere to the law, essentially posing an ongoing high risk to the public in the digital realm. Under UK law, when a defendant is mentally ill and dangerous, a hospital order with restrictions is a way to both incapacitate the individual and attempt rehabilitation in a hospital setting. It’s worth noting such orders are relatively rare and usually used for violent offenders with severe mental illness (for example, in cases of insanity or criminals who are psychotic). Using it for a cybercriminal underscores how seriously the court treated Kurtaj’s case.

For context, Kurtaj’s accomplice – the 17-year-old who was convicted – did not have the same mental health issues and was fit to stand trial. That teen received a more conventional sentence for a minor: a youth rehabilitation order with intensive supervision, essentially probation with strict conditions for about 18 months. The contrast is stark: one teen walks free under supervision, the other is locked away indefinitely. It shows that Kurtaj’s mental state and risk level were seen as exceptional. The judge’s decision also sends a message that even teenage hackers can face grave consequences, especially if they cross certain lines. In the UK, crimes like blackmail carry heavy maximum sentences (up to 14 years in prison for adults), and serious breaches of the Computer Misuse Act can also result in many years behind bars. Had Kurtaj been an adult in full mental capacity, there’s little doubt he would have received a very long prison term given the multitude of offenses. Instead, the focus is now on treating him, but with the public’s safety paramount.
Cybersecurity Insights – How Did a Teenager Outsmart Major Companies? The saga of Arion Kurtaj and Lapsus$ is a case study in the evolving nature of cyber threats. It highlights that you don’t always need sophisticated malware or nation-state level exploits to breach big targets – often the weakest link is human. By all accounts, Kurtaj’s hacks were enabled by social engineering and lapses in corporate security protocols. He did not (as far as we know) crack heavy encryption or write some genius bit of code to directly break into Rockstar’s servers. Instead, he likely talked or tricked his way in. For example, one common technique used by Lapsus$ was calling a company’s tech support line impersonating an employee and convincing the support staff to reset the employee’s password or provide an MFA code. Another method was the aforementioned MFA fatigue: bombarding an authorized user with so many login approval requests that they eventually hit “approve” out of annoyance or mistake. Insider threats were also leveraged; there are reports that Lapsus$ sometimes straight-up bribed employees at target companies, offering money in exchange for remote access or credentials. This is a reminder that all the high-end firewalls and intrusion detection systems won’t stop an attacker if an insider opens the door for them.
In the case of Rockstar Games, while we still don’t have every detail of how Kurtaj got the Slack access, it was probably through one of these low-tech but effective avenues. It might have been a phish sent to an employee’s personal email or a text message, or exploiting an exposed password from a previous data leak. Once he had an initial foothold, he could navigate internal tools that were not well-guarded against someone who appeared to be a legitimate user. Slack, for instance, was a treasure trove in this case – sensitive videos were evidently stored or linked there without additional safeguards. Many companies have since re-evaluated how they handle internal communications; one lesson is that even internal chat channels should not be treated as inherently secure. If an attacker gets in, they shouldn’t immediately find the keys to the castle. Companies are now looking at limiting what can be shared on platforms like Slack or at least using alert systems to detect unusual access (e.g., an employee account logging in from an odd location or device).
Another key security lesson is the importance of multi-factor authentication (MFA) – and doing it right. Rockstar and Uber did have MFA in place, but as we saw, basic push-notification 2FA can be exploited through human error. Cybersecurity experts suggest using phishing-resistant MFA methods, such as physical security keys (hardware tokens) or cryptographic one-time passcodes, which are much harder for an attacker to trick someone out of. If Rockstar employees had been required to use hardware security keys, for example, it would have been far more difficult for Kurtaj to use stolen passwords alone to break in. The case also underscores how crucial cybersecurity education is: employees need to be trained to recognize social engineering attempts and to be cautious with unsolicited messages or repeated authentication prompts.
From a bigger picture standpoint, law enforcement and security specialists point out that Lapsus$’s crime spree was a wake-up call. Here you had a band of teenagers, not professional criminal masterminds or state-sponsored hackers, yet they managed to embarrass and extort some of the world’s largest tech companies. They did it with creativity, persistence, and by exploiting complacency in security practices. The financial damage from their attacks has been estimated in the tens of millions of dollars across all victims. It’s a stark reminder that any organization can be a target, and even “low-level” threats can have an outsize impact. Companies must ensure not only that their technical defenses are robust, but also that their people and processes are prepared to fend off social hacks. This includes tighter controls on third-party contractors (as Uber learned when a contractor’s compromised account led to a breach) and monitoring for suspicious activities like large data downloads or unusual account behavior.
Legal and Ethical Reflections: The outcome of Arion Kurtaj’s case also raises some important points in cybercrime law and how we handle young offenders in the digital age. On one hand, the case shows that age is not a free pass for cybercriminals. Kurtaj was a juvenile for most of the period he was hacking (16 and 17 years old at the time of the major incidents), yet the legal system treated the crimes with full seriousness. Cybercrime charges can carry heavy penalties in the UK, and involvement in blackmail and fraud made it even more severe. The courts made it clear that causing real harm – whether by stealing corporate data or trying to extort money – is going to be met with real consequences, regardless of the perpetrator’s youth. This might serve as a deterrent message to other teenagers who might be dabbling in hacking for clout or quick cash; if caught, they could face years in prison or other strict sanctions.
On the other hand, the fact that Kurtaj ended up in a hospital rather than a prison does reflect an element of compassion and recognition of his mental health issues. Autism in this case was a double-edged sword: it might have contributed to his obsessive focus on hacking and his difficulty in appreciating the fallout of his actions, but it didn’t excuse those actions in the eyes of the law. Instead, the justice system adjusted its approach by focusing on treatment and public safety. There’s an ethical debate here: some might argue that someone like Kurtaj needs rehabilitation more than punishment, especially given his neurodevelopmental condition. Others might point out that mental condition or not, he knowingly broke the law multiple times and caused distress to many, and thus the indefinite detention is justified to protect society. The legal framework allowed for a solution that isn’t purely punitive – ideally, Kurtaj will receive psychiatric care, and perhaps over many years could gain better impulse control or understanding. However, the “indefinite” part ensures that he won’t be let out just because a sentence is finished; he’ll only be released if and when professionals are convinced he’s not going to relapse into criminal behavior.
This case also sits at the intersection of cybercrime and traditional law in an interesting way. Blackmail is a very old offense, but doing it via Slack by threatening to leak source code is a very modern flavor of it. Likewise, computer misuse laws had to be invoked to deal with unauthorized system access and data theft. It’s clear that legal systems worldwide are still catching up to the realities of cybersecurity – but they are willing to apply existing laws aggressively when needed. In the UK, prosecutors brought a robust set of charges to cover every angle of what Lapsus$ was doing, from fraud (for using stolen credentials and impersonation) to the Computer Misuse Act (for the hacks themselves) to extortion. They even roped in charges for things like impairing the operation of a computer (which can apply to deploying malware or wiping systems, though in this case it might relate to actions like messing with companies’ systems during the hacks).
Finally, the case sparked discussion about parental supervision and youth cybercrime. The City of London Police publicly urged parents to be more aware of their children’s online activities following the verdicts. It’s not lost on anyone that these were teenagers orchestrating multi-million-dollar crimes from their bedrooms (or hotel room, as it were). Unlike stereotypical street crime, cybercrime can attract very young individuals who have technical aptitude. It poses a challenge: how do we steer talented youth towards positive outlets rather than hacking? Programs that encourage ethical hacking and cybersecurity careers are one answer, and warnings like this case serve as another – showing the grim outcomes that can await on the dark side of hacking.
Conclusion: The story of Arion Kurtaj is a remarkable and cautionary tale of modern cybercrime. An autistic teenager with a consumer-grade gadget was able to breach a billion-dollar game studio, access top-secret content, and hold a company to ransom, all from a modest hotel room. His actions unleashed a storm in the gaming world and beyond, proving that determination and social engineering can penetrate even well-resourced firms. But his story also demonstrates that law enforcement is adapting – it took just a week for the police to identify and arrest the culprit after the GTA VI leak, thanks in part to prior investigations. Now, Kurtaj’s hacking days are on indefinite pause, as he sits in a secure psychiatric hospital receiving treatment and reflecting on how his life went from playing with computers to being labelled an “elite cybercriminal” by the press.
For the cybersecurity community, this case reinforces basic truths: people are often the weakest link, and attackers will exploit any gap in the armor – technical or human. It also highlights the need for empathy and caution: not every hacker fits the Hollywood image of a malicious genius; sometimes it’s a kid with challenges of his own, pushing boundaries without fully grasping the damage done. Nonetheless, the damage was real, and the law responded accordingly. Rockstar Games will recover and GTA VI will eventually launch to great success, but Arion Kurtaj will remain confined, a stark example of how high-tech crime can derail young lives. The hope is that this young hacker’s fate will serve as a lesson both to companies (to harden their defenses) and to aspiring hackers (to think twice about the path they’re taking), underscoring that in the cat-and-mouse game of cybersecurity, no one truly wins when a crime is committed.