Respawn Confirms Apex Legends Game Remote Input Control Incident

Respawn confirmed an Apex Legends incident where attackers remotely hijacked player inputs mid-match.

Written By
thumbnail
Ken Underhill
Ken Underhill
Jan 13, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Apex Legends players reported a disturbing in-game incident recently after attackers appeared to remotely hijack their characters’ controls during live matches — triggering movements and actions the victims never made. 

Respawn Entertainment confirmed it was investigating the issue, which raised immediate concerns about competitive integrity and player safety in one of the world’s most popular battle royale titles.

“We are aware of an active security incident where a bad actor is able to control the inputs of another player remotely in @PlayApex,” said Respawn in their social media post. 

Timeline of the Apex Incident

Reports began circulating on Jan. 9–10, 2026, after players posted clips showing their Legends suddenly moving, firing, and activating abilities without any input — often mid-fight, when the loss of control was most disruptive. 

The behavior looked less like conventional cheating and more like forced manipulation, with victims describing moments where their character actions appeared to be “driven” remotely. 

Respawn Entertainment acknowledged the situation, confirming an active security incident and stating that the team was actively investigating and working toward a fix.

They posted an update on the 10th indicating the issue had been addressed and thanked players for reporting the abnormal gameplay behavior.

Respawn has not shared the root cause, but said its initial investigation found no evidence of remote code execution or a traditional injection-style compromise. 

That points to a narrower issue in how Apex Legends handles and validates player inputs. 

One plausible explanation is that attackers targeted the game’s input pipeline — the path that carries keyboard and mouse commands through the client and to the server — allowing unauthorized actions to be processed as legitimate player behavior. 

Even so, the impact can be significant, affecting match outcomes, ranked progression, and competitive play, while creating additional risks for streamers whose on-screen actions can be manipulated live.

Advertisement

How Players Can Stay Protected

Although Respawn indicated the issue was contained, players should still take a few basic steps to make sure they’re protected if similar behavior resurfaces.  

  • Install the latest Apex Legends updates and restart the client to ensure fixes are applied.
  • Verify or repair the game installation through Steam or the EA app to confirm a clean, current build.
  • Avoid ranked or tournament play if abnormal input behavior returns until Respawn confirms full remediation.
  • Report suspicious incidents through official channels with match details, timestamps, and video clips when possible.
  • Harden account and system security by enabling MFA, updating passwords, and keeping the OS and drivers current.
  • Reduce interference by limiting third-party software such as overlays, input tools, and unnecessary background apps during play.

These steps help players stay updated, reduce disruption, and respond quickly if suspicious input behavior returns.

Advertisement

When Game Integrity Becomes a Security Issue

As competitive online games become larger, more visible ecosystems — powered by esports, streaming audiences, and ranked progression — attackers have more incentive to exploit flaws that can disrupt or manipulate live matches. 

Incidents like this highlight that game security goes beyond traditional anti-cheat tools and also depends on safeguarding the trust between players, the client, and the server. 

As live-service titles continue to evolve, developers will need stronger input validation and more abuse-resistant systems to prevent remote control-style exploits from becoming a repeatable strategy. 

That same need to verify trust at every step is why many organizations are adopting zero-trust solutions to reduce risk and contain compromise.

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.