Difference between revisions of "Sombra ARG"

From Game Detectives Wiki
Jump to: navigation, search
[unchecked revision][unchecked revision]
m (amomentincrime E-mail)
m (amomentincrime E-mail)
Line 371: Line 371:
 
== amomentincrime E-mail ==
 
== amomentincrime E-mail ==
  
'momentincrime' appeared to refer to the Roadhog and Junkrat video [https://www.youtube.com/watch?v=l5kTATxt7bE A Moment in Crime], which came out months before the release of Overwatch. A site, [http://amomentincrime.com], was also found.
+
'momentincrime' appeared to refer to the Roadhog and Junkrat video [https://www.youtube.com/watch?v=l5kTATxt7bE A Moment in Crime], which came out months before the release of Overwatch. A site, [http://amomentincrime.com amomentincrime.com], was also found.
  
 
  ...Estableciendo conexión...
 
  ...Estableciendo conexión...

Revision as of 21:14, 10 November 2016

Sombra ARG
Active since 06-12-2016
Sombra skull.png
The Sombra ARG - an ARG involving an unreleased Overwatch hero.
Type [[List_of_Investigations#Official|Official]]
Creator Blizzard
Discovered 06-12-2016

Main Page > List of Investigations > Sombra ARG

The Sombra ARG is an ARG involving Overwatch, a game made by Blizzard. Sombra is the name of an unreleased Overwatch hero that has been hinted at by Blizzard as being an upcoming playable character. Clues and ciphers referencing Sombra were found in various developer updates and short animations released by Blizzard, and this ARG is comprised of those clues.

At the game's release, there were numerous pieces of in-game information that appeared in Dorado, hinting at a character called Sombra. When Ana was revealed as Overwatch’s newest character, more Sombra clues appeared in Ana's origin video. In the weeks that followed, more clues were discovered.

Ana Videos

Ana Origin Video

On July 12, 2016, a video for the new Overwatch hero named Ana was released. By pausing the video at the 1:16 time mark, a bunch of hexadecimal numbers were discovered:

Ana Hex2.png

2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20 7B 76 20 7E
79 71 78 65 7A 76 74 7E D4 A4 79 2C 20 63 7E 72 79 72 20 72
7B 20 67 78 73 72 65 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72
79 72 20 7B 76 20 7E 79 71 78 65 7A 76 74 7E D4 A4 79 2C 20
63 7E 72 79 72 20 72 7B 20 67 78 73 72 65 2E 2E 2E 7B 76 20
66 62 72 20 63 7E 72 79 72 20 7B 76 20 7E 79 71 78 65 7A 76
74 7E D4 A4 79 2C 20 63 7E 72 79 72 20 72 7B 20 67 78 73 72
65 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20 7B 76 20
7E 79 71 78 65 7A 76 74 7E D4 A4 79 2C 20 63 7E 72 79 72 20
72 7B 20 67 78 73 72 65 2E 2E 2E 64 78 7A 75

A Hex to ASCII translation gave us

...{v fbr c~ryr {v ~yqxezvt~Ô¤y, c~ryr r{ gxsre...{v fbr c~ryr {v ~yqxezvt~Ô¤y, c~ryr r{ gxsre...{v fbr c~ryr {v ~yqxezvt~Ô¤y, c~ryr r{ gxsre...{v fbr       
c~ryr {v ~yqxezvt~Ô¤y, c~ryr r{ gxsre...dxzu

Using an XOR Cipher with the constant 23 on the above text, we got

..la que tiene la información; tiene el poder...la que tiene la información; tiene el poder...la que tiene la información; tiene el poder...la que tiene la  
información; tiene el poder...somb

The Spanish translates to

She who has the information, has the power...

A second frame of hexadecimal numbers was discovered at the 2:11 time mark of the video:

Ana Hex.png

65 76 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20 7B 76
20 7E 79 71 78 65 7A 76 74 7E D4 A4 79 2C 20 63 7E 72 79 72
20 72 7B 20 67 78 73 72 65 2E 2E 2E 7B 76 20 66 62 72 20 63
7E 72 79 72 20 7B 76 20 7E 79 71 78 65 7A 76 74 7E D4 A4 79
2C 20 63 7E 72 79 72 20 72 7B 20 67 78 73 72 65 2E 2E 2E 7B
76 20 66 62 72 20 63 7E 72 79 72 20 7B 76 20 7E 79 71 78 65
7A 76 74 7E D4 A4 79 2C 20 63 7E 72 79 72 20 72 7B 20 67 78
73 72 65 2E 2E 2E 7B 76 20 66 62 72 20 63 7E 72 79 72 20 7B
76 20 7E 79 71 78 65 7A 76 74 7E D4 A4 79 2C 20 63 7E 72 79
72 20 72 7B 20 67 78 73 72 65 2E 2E 2E

When put through the same process, the same string of Spanish was revealed, but with the letters ra at the start. These letters were combined with somb from the other cipher to create sombra, the name of an unreleased hero that had been hinted at by Blizzard in the past. The ARG was named accordingly, and no more clues were discovered until the release of the Dev Update video.

Dev Update Video

The vertical barcodes found at the end of the Ana Dev Update video

At the end of this video, a series of vertical barcodes were discovered. Scanning the barcodes gave hexadecimal numbers which where then converted to binary, a dump of which is available here.

Turning the ones and zeroes into black and white pixels formed a QR code:

Sombra QR code.png

Scanning this QR code yielded the following message:

"¿Estuvo eso facilito? Ahora que tengo su atención, déjenme se las pongo más difícil." 

And translated from Sombra's native language of Spanish into English:

Was that easy? Well, now that I have your attention, allow me to make things much more difficult.

After this, no more clues were discovered until the Summer Games video was released.

Welcome to the Summer Games Video

Tracer Trail Cipher

The unsolved base64 cipher in the Summer Games video

Note: The cipher described below remains unsolved.

On August 2, another cipher was discovered in the Welcome to the Summer Games trailer. This time, the ciphertext seemed to be in base64:

U2FsdGVkX1+vupppZksvRf5pq5g5XjFRIipRkwB0K1Y96Qsv2L
m+31cmzaAILwytX/z66ZVWEQM/ccf1g+9m5Ubu1+sit+A9cenD
xxqkIaxbm4cMeh2oKhqIHhdaBKOi6XX2XDWpa6+P5o9MQw==

Using a tool to decode the Base64 results in the following output:

Salted__���ifK/E�i��9^1Q�*Q�t+V=�
                                /ع��W/
                                      �_����V��?q����f�F���"��=q�������[��
                                                                          z��*����Z����u�\5�k�C

(Note: copy/pasting this string will not work; some of the characters are not printable and are not even displayed correctly on this page)

Decrypting the Encryption

The "Salted__" header at the start of the string indicates that the remainder of the text is encrypted with OpenSSL software library, which requires a password and the encryption cipher that was used. Salt is added by OpenSSL to ensure uniqueness of the key and the IV derived from the password and used for the encryption.

Since we know the salt, and we know the input data, all we need to decrypt is the password and cipher method. Since OpenSSL has been around for ages, there are many different cipher methods.

A Cipher is a mathematical algorithm to convert data into unreadable binary data.

A Password is key to the box, if you know it you can easily decrypt the data.

Narrowing Down Ciphers

Hex view of the encrypted string

The Cipher used has been narrowed down by looking at a Hex Dump of the encrypted string. There are two major types of ciphers, stream ciphers and block ciphers. Stream ciphers encrypt only the data fed into them, whereas block ciphers will always be a set chunk length.

A byte is roughly a single character, but special characters can take up multiple bytes. We know that OpenSSL Salted Encryption uses the first 8 bytes of the output for Salted__ and the next 8 bytes for the actual salt. The rest of the information is the encrypted message.

The immediately interesting thing here is that the encrypted message data stops 3 bytes short of a full chunk. This is a excellent indicator that the cipher used is a stream cipher (or a block cipher in CTR/OFB/CFB mode). This narrows our cipher list down significantly. This also means that the final string that Blizzard encrypted is less than 93 bytes!

This cipher remains unsolved, but it's speculated that Blizzard moved us past the cipher by giving us alternate puzzles.

Directions & Letters

There was another lead in the Summer Games video. There are references to directions that are present in the North American version of the video. These references are conspicuously absent from other versions of the trailer. These references are shown below, with the relevant heroes and timestamps:

Album of full screencaps

Here are the screencaps, arranged according to their directions.

Overwatch map.jpg

These heroes, arranged in this particular order, would provide a password that would be needed later on.

Dorado Photo

On the Overwatch media page, a new photo of the attacking spawn in Dorado was added. This photo was "datamoshed", which means it concealed a hidden message while also taking on a distorted appearance. (Here is an example of purposely data moshing the image manually to achieve similar effects)

After comparing the images via difference checking tools, it was found that certain English and Spanish characters were replaced with exclamation points, producing a Spanish sentence out of the replaced characters.

"Por que estan mirando al cielo? La respuesta no esta sobre sus cabezas, esta detras de ustedes. A veces, necesitan analizar sus logros previos."

Translated into English, this phrase is

"Why are you looking at the sky? The answer isn't over your heads, it's behind you. Sometimes, you need to analyze your previous achievements."

The phrase "Why are you looking at the sky?" is most likely a reference to a strange artifact that was discovered in the sky of the Dorado map, dubbed the "Skycode". The Skycode which ended up being a red herring, completely unrelated to the ARG.

Analyzing Achievements

"¿" Achievement, comment in source code

The phrase "you need to analyze your previous achievements" led us to look at the achievements on the Play Overwatch Website. We noticed that if you logged in and viewed the achievements on your player profile, a mystery achievement appeared. Viewing the source code of the image lead us to a new phrase:

Vientos, nada mal. No obstante, me aburro. Intentemos algo nuevo en la misma dirección.
uczihriwgsxorxwunaarawryqhbrsfmeqrjjmu 5552E494 78T3 4VM9 OPL6 IS8208O913KRlrx

Translated, it says:

Damn, not bad. However, I'm getting bored. Let's try something new in the same direction.
uczihriwgsxorxwunaarawryqhbrsfmeqrjjmu 5552E494 78T3 4VM9 OPL6 IS8208O913KRlrx

Volskaya Datamosh

The following instructions explain the process of how the ASCII Skull and "little games" quote were found:

1. Take the following section of code from the "?" achievement hint above.

uczihriwgsxorxwunaarawryqhbrsfmeqrjjmu 5552E494 78T3 4VM9 OPL6 IS8208O913KRlrx

2. Run it through a Vigenére Cipher

3. Use heroes in the order of their positions on the compass (further above) to get hero names for the passphrase:

tracertorbjornwinstonsymmetradvamercybastiongenjimccree

4. The code received will result in the following url which, when formatted in to a proper URL, becomes the following picture:

blzgdapiproaakamaihdnetmediascreenshot 5552E494 78B3 4CE9 ACF6 EF8208F913CFjpg
blzgdapipro-a.akamaihd.net/media/screenshot/5552E494-78B3-4CE9-ACF6-EF8208F913CF.jpg

The distortion on this picture indicates that it, too, is "datamoshed", and that it conceals hidden information. A difference check between the new and original image resulted in an interesting message.

ASCII Skull #1

The diff from the datamosh resulted in the following output:

Parece que te gustan estos jueguitos... por que no jugamos uno de verdad?
                          :PB@Bk:
                      ,jB@@B@B@B@BBL.
                   7G@B@B@BMMMMMB@B@B@Nr
               :kB@B@@@MMOMOMOMOMMMM@B@B@B1,
           :5@B@B@B@BBMMOMOMOMOMOMOMM@@@B@B@BBu.
        70@@@B@B@B@BXBBOMOMOMOMOMOMMBMPB@B@B@B@B@Nr
      G@@@BJ iB@B@@  OBMOMOMOMOMOMOM@2  B@B@B. EB@B@S
      @@BM@GJBU.  iSuB@OMOMOMOMOMOMM@OU1:  .kBLM@M@B@
      B@MMB@B       7@BBMMOMOMOMOMOBB@:       B@BMM@B
      @@@B@B         7@@@MMOMOMOMM@B@:         @@B@B@
      @@OLB.          BNB@MMOMOMM@BEB          rBjM@B
      @@  @           M  OBOMOMM@q  M          .@  @@
      @@OvB           B:u@MMOMOMMBJiB          .BvM@B
      @B@B@J         0@B@MMOMOMOMB@B@u         q@@@B@
      B@MBB@v       G@@BMMMMMMMMMMMBB@5       F@BMM@B
      @BBM@BPNi   LMEB@OMMMM@B@MMOMM@BZM7   rEqB@MBB@
      B@@@BM  B@B@B  qBMOMB@B@B@BMOMBL  B@B@B  @B@B@M
       J@@@@PB@B@B@B7G@OMBB.   ,@MMM@qLB@B@@@BqB@BBv
          iGB@,i0@M@B@MMO@E  :  M@OMM@@@B@Pii@@N:
             .   B@M@B@MMM@B@B@B@MMM@@@M@B
                 @[email protected]@MBB@B@B@@BM@::B@B@
                 B@@@ .B@B.:@B@ :B@B  @B@O
                   :0 r@B@  B@@ .@B@: P:
                       vMB :@B@ :BO7
                           ,B@B

Translation:

"It seems you like these little games... Why don't we play a real one?"

This is the python2 script to extract modified bytes from datamoshed volskaya screenshot, https://gist.github.com/synap5e/27635d2ff6f0e3b15f0c902dca2974a9

The ASCII image of the skull seemed to be a dead end, however, as no further progress was made until August 23rd.

Overwatch Forums Glitching Page/ "Skycoder"

A user named 'Skycoder' posted an ominous topic on the official Overwatch forums.

The name of the topic, if translated from binary, says "23"; a reference to Sombra, who is the 23rd character in Overwatch. The time posted on the forums was set at 23h and had since been counting down rather than increasing; it was assumed to be a countdown to something (see below).

This topic's page soon begins to glitch and distort, turning a hue of purple before opening a text box stating:

 "la que tiene la información; tiene el poder"
 "She who has the information, has the power"

and typing another code:


 ICAgICAgICAgICAgICAgICAgICAgICAgICA6UEKPQms6CiAgICAgICAg
 ICAgICAgICAgICAgICAsakKIQEJAQkBCQEJCTC4KICAgICAgICAgICAg
 ICAgICAgIDdHlkKTQpVCTU1NTU1CQEJAQkBOcgogICAgICAgICAgICAg
 ICA6a0KSQpCIl01NT01PTU9NT01NTU2MQphCQEIxLAogICAgICAgICAg
 IDo1kUKNQphCiEJCTU1PTU9NT01PTU9NT01NipJuQm5CQEJCdS4KICAg
 ICAgICA3MG6GlUKIQpJClEJYQkJPTU9NT01PTU9NT01NQk1QQphCiEJA
 QkBCQE5yCiAgICAgIEeYlpdCSiBpQohCh4ggIE9CTU9NT01PTU9NT01P
 TZYyICBCj0JAQi4gRUJAQkBTCiAgICAgIJKWQk2HR0pCVS4gIGlTdUKI
 T01PTU9NT01PTU9NTZdPVTE6ICAua0JMTYhNhkKXCiAgICAgIEKMTU1C
 mUIgICAgICAgN4hCQk1NT01PTU9NT01PQkKWOiAgICAgICBCh0JNTYhC
 CiAgICAgII2YiEKKQiAgICAgICAgIDeSlkBNTU9NT01PTU1AQkA6ICAg
 ICAgICAgQEBCQEJACiAgICAgII+ST0xCLiAgICAgICAgICBCTkKPTU1P
 TU9NTY9CRUIgICAgICAgICAgckJqTYRCCiAgICAgIJBAICBAICAgICAg
 ICAgICBNICBPQk9NT01NQHEgIE0gICAgICAgICAgLkAgIEBACiAgICAg
 IISVT3ZCICAgICAgICAgICBCOnWMTU1PTU9NTUJKaUIgICAgICAgICAg
 LkJ2TUBCCiAgICAgIIRCkUKYSiAgICAgICAgIDCRQpdNTU9NT01PTUKV
 QkB1ICAgICAgICAgcUBAQEJACiAgICAgIEKETUJCjHYgICAgICAgR4+L
 Qk1NTU1NTU1NTU1NQkKINSAgICAgICBGhEJNTUBCCiAgICAgIIdCQk1/
 QlBOaSAgIExNRUKFT01NTU2PQoNNTU9NTYpCWk03ICAgckVxQodNQkKE
 CiAgICAgIEKYloRCTSAgQm1ChEIgIHFCTU9NQpBChUKEQk1PTUJMICBC
 QEJAQiAgQEJAQkBNCiAgICAgICBKlm2GhFBCj0KEQplCN0eIT01CQi4g
 ICAsQE1NTUBxTEJAQkBAQEJxQkBCQnYKICAgICAgICAgIGlHQpUsaTCE
 TZZCbk1NT4tFICA6ICBNQE9NTUBAQEJAUGlpQEBOOgogICAgICAgICAg
 ICAgLiAgIEKXTZBCj01NTUBCQEJAQkBNTU1AQEBNQEIKICAgICAgICAg
 ICAgICAgICBAQkBCLmlATUJCQEJAQkBAQk1AOjpCQEJACiAgICAgICAg
 ICAgICAgICAgQkBAQCAuQkBCLjpAQkAgOkJAQiAgQEJATwogICAgICAg
 ICAgICAgICAgICAgOjAgckBCQCAgQkBAIC5AQkA6IFA6CiAgICAgICAg
 ICAgICAgICAgICAgICAgdk1CIDpAQkAgOkJPNwogICAgICAgICAgICAg
 ICAgICAgICAgICAgICAsQkBCCg==

ASCII Skull #2

The code was recognized to be Base64, which was then translated to a new ASCII image:

                          :PB.Bk:                          
                      ,jBˆ@B@B@B@BBL.                      
                   7G–B“B•BMMMMMB@B@B@Nr                   
               :kB’B.ˆ—MMOMOMOMOMMMMŒB˜B@B1,               
           :5‘B.B˜BˆBBMMOMOMOMOMOMOMMŠ’nBnB@BBu.           
        70n†•BˆB’B”BXBBOMOMOMOMOMOMMBMPB˜BˆB@B@B@Nr        
      G˜–—BJ iBˆB‡ˆ  OBMOMOMOMOMOMOM–2  B.B@B. EB@B@S      
      ’–BM‡GJBU.  iSuBˆOMOMOMOMOMOMM—OU1:  .kBLMˆM†B—      
      BŒMMB™B       7ˆBBMMOMOMOMOMOBB–:       B‡BMMˆB      
      .˜ˆBŠB         7’–@MMOMOMOMM@B@:         @@B@B@      
      .’OLB.          BNB.MMOMOMM.BEB          rBjM„B      
      .@  @           M  OBOMOMM@q  M          .@  @@      
      „•OvB           B:uŒMMOMOMMBJiB          .BvM@B      
      „B‘B˜J         0‘B—MMOMOMOMB•B@u         q@@@B@      
      B„MBBŒv       G.‹BMMMMMMMMMMMBBˆ5       F„BMM@B      
      ‡BBM.BPNi   LMEB…OMMMM.BƒMMOMMŠBZM7   rEqB‡MBB„      
      B˜–„BM  BmB„B  qBMOMB.B…B„BMOMBL  B@B@B  @B@B@M      
       J–m†„PB.B„B™B7GˆOMBB.   ,@MMM@qLB@B@@@BqB@BBv       
          iGB•,i0„M–BnMMO‹E  :  M@OMM@@@B@Pii@@N:          
             .   B—M.B.MMM@B@B@B@MMM@@@M@B                 
                 @[email protected]@MBB@B@B@@BM@::B@B@                 
                 B@@@ .B@B.:@B@ :B@B  @B@O                 
                   :0 r@B@  B@@ .@B@: P:                   
                       vMB :@B@ :BO7                       
                           ,B@B                            

It should be noted that the skull above shouldn't be used to decode anything, just that it's a skull. Characters do not copy the same for some people due to character sets being different. Instead, a much simpler method is going to be used to achieve this.

First, you must strip both skulls of spaces, and new characters. You can do this in Notepad++ or any semi-advanced text editor. The strings cannot be shown due to their length, but the idea is to have them be on a single line with no spaces.

The process to get something out of these 2 strings is to subtract each byte from both skulls, and showing the ones that are not 0. A user on our Discord has given us a script made in C to automate this hosted on this Pastebin. You can compile it and read the source to get an understanding of what you need.

After subtracting each byte from both skulls, you end up with this string:

OHVSURPHWLXQMXHJR...FUHRTXHXVWHGHVORVGHWHFWLYHVGHMXHJRVOROODPDULDQXQWUDLOKHDG?EOCJGDXVD-DPEDV-FDODYHUDV.KWPO

This string was recognized as a Caesar Cipher. After shifting it 23 places, it resulted in:

LESPROMETIUNJUEGO...CREOQUEUSTEDESLOSDETECTIVESDEJUEGOSLOLLAMARIANUNTRAILHEAD?BLZGDAUSA-AMBAS-CALAVERAS.HTML

Alternative method to arrive at a similar string to the above

Decoding the Base64 string, extracting all of the non-UTF-8 characters, and subtracting 0x23 from the value of each character yields:

lesprometiunjuegocreoqueustedeslosdetectivesdejuegoslollamarianuntrailheadblzgdausaambascalaverashtml

This process is similar to a Ceaser Cipher, so it is arguable that either one of the methods could have been intended.

When cleaned up and translated, the message reads:

Les prometi un juego...creo que ustedes los Detectives de Juegos lo llamarían un trailhead? BLZGDUSA-AMBAS-CALAVERAS.HTML
I promised you a game...I believe you Game Detectives would call it a trailhead? BLZGDAUSA-AMBAS-CALAVERAS.HTML

"USA-AMBAS-CALAVERAS" translates to "USE-BOTH-SKULLS", and the .HTML extension hinted at a URL.

Skull Video

BLZGDA is Blizzard's server for hosting media, using full URL we get:

https://blzgdapipro-a.akamaihd.net/media/screenshot/usa-ambas-calaveras.html

This link leads to a video which clearly shows an image of a skull, along with a dossier of info:

6Pk69LX.png

In the video properties you can find:

Parecen estar muy interesados en estos "héroes". ¿Tal vez les interese conocer algunos detallitos que he averiguado sobre ellos?
You seem to be very interested in these "heroes". Maybe interested to know some details that I found out about them?

There is also a heartbeat monitor in the video - by looking at which lines it "pings" on, and by assigning letters to these lines, we get:

momentincrime

amomentincrime E-mail

'momentincrime' appeared to refer to the Roadhog and Junkrat video A Moment in Crime, which came out months before the release of Overwatch. A site, amomentincrime.com, was also found.

...Estableciendo conexión...
...Protocolo Sombra v1.3 iniciado...

...Infiltrando la respuesta automática del email de pistas...

...Terminando conexión...

It was discovered that sending an e-mail to [email protected] resulted in an automated response via email:

Thank you for contacting A Moment in Crime's anonymous crime line!

We have analyzed your submission and forwarded the information to the relevant parties. Your help could be vital in apprehending these cri

...Estableciendo conexión...
...Protocolo Sombra v1.7 iniciado...


01:07:47 02:02:02 01:08:06 02:13:43 01:18:32
01:18:21 02:10:19 01:06:21 02:05:18 01:04:02
01:07:08 02:18:25 01:13:04 02:19:20 01:23:02
01:16:40 02:16:35 01:23:04 02:17:16 01:06:42
01:13:29 02:18:06 01:05:02 02:15:41 01:08:34

j.7F57O,NLv:qj.7B:,1qv@B1j5ivB:,

...Terminando conexión...

minals and bringing them to justice. These fugitives are responsible for a string of robberies, arson, and other crimes stretching from Sydney to  King's Row.
 
Authorities believe that they have set their sights on crossing the Atlantic to America.


If the timestamp-looking numbers are taken as AA:BB:CC, where AA is the number of skull, BB is the row and CC is the column (as illustrated here), the 5x5 table would look like this:

S j G B L 
. @ M O k 
i , v : 0 
E 7 r q N 
J P 5 F 1

(although, note that these symbols are the same in both skulls).

If this is used as the key for the Bifid cipher for the string below the table:

j  .  7  F  5  7  O  ,  N  L  v  :  q  j  .  7  B  :  ,  1  q  v  @  B  1  j  5  i  v  B  :  ,
12 21 42 54 53 42 24 32 45 15 33 34 44 12 21 42 14 34 32 55 44 33 22 14 55 12 53 31 33 14 34 32

1 2 2 1 4 2 5 4 5 3 4 2 2 4 3 2 4 5 1 5 3 3 3 4 4 4 1 2 2 1 4 2
1 4 3 4 3 2 5 5 4 4 3 3 2 2 1 4 5 5 1 2 5 3 3 1 3 3 1 4 3 4 3 2

11 24 23 14 43 22 55 45 54 34 43 23 22 42 31 24 45 55 11 52 35 33 33 41 43 43 11 24 23 14 43 22
SOMBr@1NF:rM@7iON1SP0vvErrSOMBr@

This string of characters would be used as a password later on. The phrase is leet-speak; when translated, it becomes

Sombra Information is power Sombra

Meanwhile, the countdown on the Blizzard forum post approached zero...

Image of Reaper

The Sombra-ARG Discord server created a datamoshed image as a message to Sombra, and popular Overwatch YouTuber Muselk sent the image to @PlayOverwatch. An Imgur version of this image can be found here.

The base image for the datamosh that was sent can be seen here.

We were able to obtain an original uncompressed copy of the datamosh we sent to Blizzard from the Sombra-ARG Discord, allowing us to reverse engineer and confirm the message that we sent.

The message was as follows:

Bueno Sombra, jugemos un juegito y depaso nos das algo con que jugar
Okay Sombra, let's play a little game and in return you can give us something to play with

A more in depth history of the message we sent can be found in this Imgur gallery.

We received no response from Sombra until a post by Skycoder appeared on the US Battle.net forums. During the destruction of the website itself, you can see an image fly around on the page. This image appeared on the forum post a few hours after the post originally appeared, and many have chalked this up to a mistake on Blizzard's part. This image depicts Reaper on Temple of Anubis, and is quite similar to the image that Muselk sent to Sombra via twitter, although it does appear to have immediately noticeable differences. Namely, the file size is much bigger and there is a visible shift of the image to the left towards the bottom of the image.

A Discord user has created a script in order to automate the work that was originally being done manually, and also much better. Before, there was missing data, though there clearly was something there as people had already interpreted the message before it was fully revealed. You can find some of the original work before this was finished here, it explains a good bit.

Moving on to the acquisition of this message, you will ideally need to use this C script made by a user, which has to be compiled through your favorite compiler. Blizzard seems to use a symbol for points of interests in these messages, namely '!'. What the script will attempt to do is recreate the image Blizzard sent visually by injecting the symbol into certain blocks of the image, and then compares that block to the same block in the image from Blizzard. If the script sees that it is the same, it moves on with the changes made. Otherwise, it will revert those changes and try them on another block for the remainder of the image. Every time it succeeds with this process, it will output the previous value that was replaced with the symbol along with it's location. The message acquired using this process is shown below:

Aquiesta tujuego
Here's your game

It may be likely that this was supposed to be solved before we solved the amomentincrime E-mail but it will never be known.

A Moment in Crime Transmission

amomentincrime.com as of August 24th, 2016

Once the countdown on the Skycoder forum post reached zero, amomentincrime.com was updated. It now said:

...Estableciendo conexión...
...Protocolo Sombra v1.9 iniciado...

...Transmitiendo información a ómnicos activos... 2%

...Terminando conexión...

Translating the text on the page becomes:

...Establishing connection...
...Sombra Protocol v1.9 initiated...

...Transmitting information to active omnics... 2%

...Ending connection...

A comment was added in the source code:

Bien hecho, ya tienen mi clave. Hackear este programa de televisión no tuvo chiste. Espérense a lo que sigue.
Well done, you have my password. Hacking this television program was meaningless.  Wait for what is coming.

Due to confusions during translation, "no tuvo chiste" does directly translate to "You did not joke." But after asking someone who speaks Mexican Spanish, the phrase was clarified to mean "there was no point in it." There are more translation confusions that do not properly convey the tone of the message. Originally, it was "Hacking this television program was meaningless. Wait for what follows." The tone of that though was seemingly trying to show off what she will do. It should be noted that she also implied hacking the television program was easy.

The percent number on the amomentincrime.com seems to be going up slowly. Note that it's not updating for everybody at the same time, probably due to the caching tech employed for the amomentincrime.com.

There is an uncached version of the website that can be found here.

Over time the percentage rose, and the Sombra Protocol version number went to v1.95 after 5% was hit. Since then the percentage increases by 0.0038 every 3 minutes.

Another comment was added to the source code as well:

Parece que se están calentando un poco las cosas... tendré que pasar desapercibida mientras esto se finaliza.
It seems things are heating up a bit... I'll have to go unnoticed while this is finishing.

On 18th October at 19:02 GMT the site reached 100%, and the site updated, leaving this message:

...Transmisión finalizada - finalizando carga... 
...Carga finalizada. Unidad Bastion E-54 comprometida...

Which roughly translates to:

...Transmission complete - finishing upload...
...Upload finished. Unit Bastion E-54 engaged...

Hidden in the source code of the site was

v1.4.0.2.324??

Which seems to hint to something related to this ARG being hidden in the next version of Overwatch.

Sombra vs. LumériCo

The Hacked Bastion

On 2016-10-19, a new Overwatch version was released - version 1.4.0.2.32448, which amomentincrime.com updated shortly afterwards to change the two ?s to the same numbers. Users discovered that Bastion had a strange interaction on the Dorado map - when next to one of the SOMBRA PROTOCOL terminals, he would emit a series of beeps.

The beeps were, in fact, morse code and decoded to SQOFJFBNITIZWGDXSDO. This was figured out to be a Vigenere cipher and used the letters from SOMBr@1NF:rM@7iON1SP0vvErrSOMBr@ as the key SOMBrNFrMiONSPvvErr to solve it into:

ACCESSWWWLUMERICOMX

LuméReaction

The homepage of http://lumerico.mx

This lead to the website https://lumerico.mx/, for the fictional Mexican company LumériCo, who have built several reactors in Dorado. The page had a news page, noting the opening of a new reactor on November 1 as well as a recent attack on the site. There were also about and login pages.

A few extra txts were found, none of them serving any apparent purpose or relevance:

Allow: omnics

This is a joke about the Robots exclusion standard, a txt file usually included to tell bots accessing the site what they should and should not do - a common usage is telling Googlebot not to index the site on Google. However, Blizzard have instead chosen to allow Omnics, the fictional race of robots in the Overwatch universe, to access the site.

Allow: ??
Allow: ???

Although it is uncertain, this seems to be another joke about the Robots exclusion standard.

{"message":"thanks for calling the api"}

A piece of JSON markup that forms the world's smallest and most useless API

Phone number

There is a phone number at the bottom of the page: (510) 766-2726. If you call it, you hear a woman speaking in spanish. She says a string of numbers: 5-2-4-1-3 (pause) 23-4-14-8-6-18-17-23-21-18-15

The second part translates (a=1, b=2, etc) to WDNHFRQWURO. After rotating 23 times (ROT-23 cipher) this becomes TAKECONTROL.

Take Control

The phone message lead to a more significant page on the site: https://lumerico.mx/TAKECONTROL/index.html. It's styled the same way as amomentincrime.com is and featured an image of Sombra's skull icon, named "calavera.png" (a Spanish name for "skull" associated with the Mexican Day of the Dead). There was also text on the page:

ethldtíoíesnoemfetuylm.bnlsssqtann)hcnslararuCpdGeoopéqubdsroaan.arnasdmdor1vrsmerñerlsdacnnnoaexedsidcn.iarsgcyi,iqeqnd.pooitoaeaaransterLetéáedasodocMrnseeiuCsimnosetlójnueodacapsadcoanfasest.rnucaodacadmdoemoipíogPoipbehaSussai.,yccandin.reueatenaoiorneoeetaoéyenimt¿rPehec,uurobudeílrysriteenasni,adngpjrálireecgrolsmhYnao?nmonomepeldezmapcpunoaulrrruCstmeitltetlróesoapsdéyufcuascaa,rensbuinergnqedlmvlbpdtaz.enebuineuldoerecrGefqfirrasulrbeatHsilnbaúaeeaaooassraooa,ioedo:aLiuielPr ursmoootlnielteeánlosulobeauaanopearrúiesltéyrosssisuaaeaenremsieaismdjmolrsspebiecdéyusittnvrcacp.taebrtLiunróporner
 
eúcrneuyraarsettsyrseen.aaPnrneuyraeastuCpnhl/wLloaloa.qartlsyuínreute.evgdpiuábdmPooucvdeccmoreurr.o?unriorydbaSnalegeáezadienáutalaaioeemfcbgdinableoc¿éppoeocelsumuoaHearsosqadrrrftuLiorannnoneneriiatcnlomoqnaqdunrcno,enmerosaereisloabolii.e.dormerosepopdé,eo:r#5scoegaqoeaibs(edioraamtdírnlyoetjcgratmnrrobnrsstloeYqoeocicpnómlpernmaepogenmodqamubodnaeasuaenMoolloupeqvgrLtúr
 
tsosrdvoeaerroaeusdmaauamoMobsnaeanraunnt,roierbeoiemaodbmantursotñauoureeuoerreopc.etlr
 
sotñneerLimeaFsNJ

This is a column order transposition cipher with the key 5 2 4 1 3, which was obtained in the phone call. The result is: (spaced out for clarity)

Los felicito por haber llegado hasta aquí. Solo quería saber si estaban listos. (Hey, es muy difícil encontrar buena ayuda últimamente...deberían ver algunos de los payasitos que están trabajando conmigo) Por ahora, continuemos con el verdadero reto: acabar con LumériCo y su president e Guillermo Portero. ¿Y porqué? Porque es un hombre codicioso, corrupto y un ladrón abominable. Su plan de traer en línea el más grande y el más poderoso zigurat el 1 de noviembre no es nada más que una artimaña, un elaborado plan designado para ejercer aún más influencia sobre la gente de México y en gordar los bolsillos de sus compinches. ¿Y quién va a pagar por eso? La gente común y corriente, los mismos que siempre quedan olvidados.

He empezado a mejorar mis protocolos para que sean usados para derrumbar la infraestructura de LumériCo y Los Muertos también están intentando levantarse en contra de la corrupción. Mientras tanto, escarben por el sitio de LumériCo y busquen información que podamos usar en contra del cabrón, mejor aún, encuentren su nombre de usuario y contraseña para asegurarnos de que ciertos detalles no muy favorables sobre el presidentito...aparezcan...

Pude encontrar el nombre de usuario y contraseña de un empleado de soporte de LumériCo, empiecen por ahí:

GFlores/g#fNwP5qJ

Translated:

I'm congratulating you for getting in here. I only wanted to know if you were ready or not. (Hey, it's really difficult to get good help lately... you should see some of the clowns I'm working with). For now, let's continue with the true challenge: taking down Lumerico Corp president Guillermo Portero. Why? Because he's a greedy and corrupt man, and an abominable thief. His plan of bringing in line the most powerful and biggest zigurat the 1st of november us nothing more than a deceit, an elaborate plan by his gang to become even more influential in the people of Mexico and get more money. And who's gonna pay for that? Common people, the ones that are always forgotten.

I've started upgrading my protocols so that they are used to take down the Lumerico Corp infraestructure and Los Muertos are also trying to go against the corruption. Meanwhile, search the Lumerico Corp site for info we can use against the bastard, or better, get his username and password so that hundreds "not so favorable" facts about the president start popping up.

I was able to get the username and pass of a Lumerico Corp employee, start here:

GFlores/g#fNwP5qJ

Presidential Login

There is a login page on the lumerico.mx website. Using the credentials obtained through the message above, we accessed the account of Gonzalo Flores. You get access to his emails. Transcripts of these emails are archived here.

Most of them have no significance, except the one that does:

De:Valeria Valderrama<[email protected]>
Para:Gonzalo Flores<[email protected]>
Asunto:Página de Guillermo

Hola, Gonzo:
¿Puedes ver el tráfico de https://lumerico.mx/president-bypass? Guillermo debería ser el único accediendo desde su página de inicio privada, pero parece que está teniendo mucho tráfico. Tal vez tengamos que escalar esto a
la señorita Jiménez, pero quiero estar segura de que es digno de su tiempo.

Valeria Valderrama

Which is about there being a lot of traffic to the President Bypass Link. That page displays an "access denied" message, but there is a President Auth-Bypass Revision 1.02: /.git/ line in the source code.

That lead a user to dump the data from the /.git/ subpage with git protocol and upload it to Github. That were codebehind files for the website, including a class.authentication.php file containing an encryption function and class.president-bypass.php file containing the president's (Guillermo Portero) username GPortero and encrypted password ?MzY:MTI5:?AzY:OWM?:?EDO:ZGU?:jVTM:MTJm:2ITM:MTUw:?QjY:OWY?:?kTO:MTQx:?MzY.

Discord users with the required technical knowledge wrote a function that would reverse the encryption from class.authentication.php and used it on the encrypted password. The resulting presidential password is Xy@4+Bkuqd<53uJ.

After logging in to the President's account, we accessed his emails the same way we accessed Flores' ones.

While we were sifting through them for about 30 minutes, another email popped up. This one being from Sombra:

Veo que se han podido infiltrar en su correo.
No se preocupen, él no puede ver este correo, lo he ocultado de su vista si se conecta desde una de sus direcciones conocidas de IP.
Necesito un poco más de tiempo para establecer el próximo grupo de potocolos. Manténganse atentos a principios de la otra semana. Le echaré unos cuantos trapitos sucios en sus correos para que se filtren al público
"accidentalmente". Ya veremos como reaccionan los medios de comunicación.

The rough translation is:

I see you have been able to infiltrate into his mail.
Don't worry, he cannot see this email, I've hidden it from his sight if he connects from one of his known IP addresses.
I need a little bit of time to establish the next set of protocols. Stay alert early next week. I'll throw some dirty laundry in his emails that can "accidentally" leak to the public. We'll see how the media will react to that.

Admin Access

The admin panel of the Lumerico site, only accessible by logging in as MJimenez

On October 25, new emails were discovered in the GFlores account, but they had no immediate significance to the ARG. In addition, omnics.txt was updated:

Allow: Tzolk'in
Allow: Imix ChikchanManik Imix ChikchanImixChikchanImix Manik Chikchan Imix Kimi Chikchan Chikchan Kimi ChikchanImixChikchanImix ChikchanKimi

Tzolk'in is the name of a Mayan Calendar, and the second line is a series of animals from it in the Tzolk'in dialect. Imix stands for Day 1, Chikchan — 5, Manik — 7 and Kimi — 6. Turned into numbers, the string reads 1 57 1 5151 7 5 1 6 5 5 6 5151 56. These digits turned into pictograms of Maya numerals (one by one, not numbers as a whole) written horizontally become . -..- . -.-. ..- - . .- - - .- -.-. -.- That is a morse code, which decodes to EXECUTEATTACK.

This led us to https://lumerico.mx/EXECUTEATTACK/index.html, where the following text was discovered:

Ha llegado el momento. Esos correos expuestos la verdad sobre Portero, iniciado la revuelta, y hemos convencido a la gente de México a apoyar nuestra causa. Ahora es el momento para el golpe. Convertiremos su preciada inauguración el 1 de noviembre en un gran movimiento en su contra. Necesito que hagan una cosa:
Consigan acceso al correo del jefa de seguridad y busquen alguna forma de ayudarme en el ataque. Es posible que lo vean contactando a Portero pronto. He cambiado su contraseña a: d0r*NuLw9

Translated to English:

The moment has come. These emails exposed the truth about Portero, initiated the revolt, and have convinced people of Mexico to support our cause. Now is the time to strike. Convert his precious inauguration on November 1 to a large movement against it. I need you to do one thing:
Get access to the email security chief and seek some form of help in the attack. You may see her contacting Portero soon. I've changed her password: d0r*NuLw9

Logging in with the credentials MJimenez / d0r*NuLw9 gave us access to the admin panel of Lumerico. Until 01 Nov. 2016 it stayed inactive and any command was answered with the same message saying the terminal disconnected.

The Terminal

Once the console became usable, you could type help to see a list of commands:

override     Engineer safety mode override
help         Provides help information about commands
version      Displays system version information
about        Displays information about the system
grep         Search output by string

In the MJimenez email account, there's an email labeled Corrupción de correo electrónico with highlighted text in side of it, specifically /ter/. After some hard thinking, people discovered that doing about | grep 'ter' (in linux this is a command to list all the lines from the about that have a substring ter) returns this text:

Open source lightweight shell for any terminal.
Anything with a terminal
1.1.0 - expanded terminal support

The first word of every line given from the output is bold and also purple, signifying something interesting about it. Put together you get OpenAnything1.1.0, which is where we move onto the next bit below.

Another available and most important command is override. Before applying the safety mode override, the console prompts you with three security questions:

  1. Favorite Movie. The answer to the prompt is some like it bot, a movie from the Overwatch universe.
  2. Favorite Cookie Flavor. The answer being nuevas sabor delicias, a flavor referenced in an email in the MJimenez account.
  3. Secret. The answer to this prompt is OpenAnything1.1.0.

This returns OK, gives you admin access and enables a new set of commands:

ls Lists files by path
cat Read file by path
exec Execute a file 

Typing ls lists two files: payload and d_ilqh_nhb.html (the file name is a ROT23 for a_fine_key).

a_fine_key.html
Reading the second file with cat mnt/d_ilqh_nhb.html gives a text where ascii characters (repeating string vhnl tldv xyl vcxelo xv qhrtv. zkolg[nl]) are in a shape of a key. Deciphering it using the Affine cipher (A=23, B=23) yields the following string: some keys are shaped as locks. index[me].

Simultaneously, entering exec payload presents you with a prompt — the answer to which is the Tracer Trail. When inputted, you are given a message that looks quite similar to what was previously seen at amomentincrime.com. You are then added to the counter shown in the top right.

LumericoTerminalTracerEntered.jpg

It is assumed that some keys are shaped as locks line was directly alluding to the Tracer Trail being used as a key and there were no further steps that solvers managed to skip.

Misdirection

lumerico.mx website hacked by Sombra

Somewhere about the end of investigation on 10-01-2016, when the values on the gauges after executing the payload were nearing or passed 100, the lumerico.mx home page changed to show "glitches" and the black overlay with a message under the purple skull, while a string <!-- MISDIRECTION --> was also added to the source of the page.

The message says:

Buen trabajo, amigos. No lo hubiera logrado sin su ayuda. En fin, me consiguieron los recursos que necesitaba para mi siguiente golpe – les encantará.
Esperen noticias de mí en los próximos días...
Les voy a mandar algo para agradecerles… Ojalá lo puedan aprovechar.
Dasvidanya amigos

Translated:

Good job, folks. I would not have done it without your help. Anyway, I got the resources needed for my next hit - you'll love it.
Expect to hear from me in the coming days...
I'm going to send something to thank you ... Hopefully you can use it.
Dasvidanya friends
The Día de Los Muertos spray that was added to the game after Sombra hacked the Lumerico site

Note that Dasvidanya is a phonetic transliteration of до свиданья — a russian phrase for "goodbye". The thing that Sombra sent as a thank you was a new spray, named "Día de Los Muertos" after the Mexican festival that took place at the same time as the ARG. The spray is currently only available on the PC version of the game.

The MISDIRECTION string lead to the page https://lumerico.mx/MISDIRECTION/index.html containing:

...Estableciendo conexiуn...
...Protocolo Sombra v2.3 iniciado...

...Desviando datos del zigurat de LumériCo hacia el objetivo...
...Descifrando contraseсas del objetivo...
...Acceso otorgado al directorio de volskayaindustries.com...

...boop ;)...
...Terminando conexión...

Translated:

...Establishing connection...
...Sombra Protocol v2.3 initiated...

...Forwarding the data from the LumériCo ziggurat to the target...
...Deciphering the target passwords...
...Access Granted to the directory of volskayaindustries.com...

...boop ;)...
...Ending connection...

Sombra vs. Volskaya Industries

As of 2016-11-02, the website http://volskayaindustries.com only has a placeholder saying Превышена нагрузка на сервер. Ведётся техобслуживание. (Server is overloaded and is under maintenance).

Blizzcon

SombraBG.jpg

Blizzcon 2016 opened with the Overwatch short "Infiltration", a short depicting Reaper, Widowmaker, and Sombra on Volskaya Industries. During the showing of the short, Sombra's hero page went live, showcasing her abilities and character backstory.

References

Community Resources

A collection of tools and resources made by the Game Detectives Discord community for use in the ARG.

ASCII Skull

ASCII Skull Analysis: https://github.com/bahamas10/sombra

Removing SOMBR@ Analysis: http://pastebin.com/15u27YTC

ASCII Skull Eye Analysys: https://docs.google.com/spreadsheets/d/1-JQpWyitMKYhP-4l8ZDFiJI3NjqRrvoEnRdFQawike8

Google Docs

Observations and Speculations Spreadsheet: https://docs.google.com/spreadsheets/d/1rI08baFQmAwaqHC-9GF9VNGCYjuRE-q4LN9k4ottjuQ/pubhtml

LumériCo Emails and Translations Spreadsheet: https://goo.gl/cQgdIJ (Courtesy of UberPilot)

Tracer Code

GOL! Guesser: http://axxim.net/ow/gol-guesser/

Uber GOL! Guesser: http://axxim.net/ow/gol-guesser/uber/

The Uber GOL! Guesser only prints out UTF-8 compliant results, which makes it easier to identify potentially correct answers.

Bruteforcing tool: https://github.com/glv2/bruteforce-salted-openssl

Third-Party Resources

A collection of third-party tools and resources that the Game Detectives Discord community has used in the ARG.

Image of Reaper

stegdetect (Linux): https://github.com/abeluck/stegdetect

stegdetect is a Linux utility used to determine if a given image may contain encoded information.

JPHide & JPSeek: http://linux01.gwdg.de/~alatham/stego.html
iSteg (Mac OSX): http://www.hanynet.com/isteg/

JPHide & JPSeek is used to hide and find, respectively, a file inside a JPEG image.
iSteg works similarly to JPHide on the Mac OSX platform.

stegbreak (Linux): http://linux.die.net/man/1/stegbreak

stegbreak is used to do brute-force dictionary attacks on JPEG images.

Old / False Leads

Click here for all of the false leads that the community came across while trying to solve the Sombra ARG!

Derivative Works

The long road to solving the ARG have sparked several people into creating pieces of media as a joke or just as a spark of creativity. Most notably is the skysong; the misinterpreted skycode that had been interpreted as a piece of music by Gingerware. The following derivate works have been inspired by this.

Description Author Title Work
Original thread on how the OP thought the skycode was music Gingerware Skysong SoundCloud (Notable examples "Ordered 60 Upsidedown Loop", "Skysong 120 tempo looped" and Sombra Skysong - Overwatch)
Trap rendition of the skysong SnerK Sombra SoundCloud
Youtube video with pieces of ARG and SnerK's Trap Skysong Unknown Fusion Snerk - Sombra YouTube
Youtube skit on the initial stall Goose Boose Sombra ARG in a Nutshell YouTube
An opensource android app to keep up with the Sombra ARG. Jasona99 and CyanogenBot Sombra Checker GitHub (Download the .apk file in the root folder for the compiled app)
Fanart using the skull and skycode Pocketomi Sombra Interpretation Sombratransparent.png
Sombra fanart with mask as focus Pocketomi Mask DeviantArt
Sombra 4K wallpaper Palas Wallpaper DeviantArt
Fanart Orroko Sombra on Dorado DeviantArt
Fanart Orroko Sombra 2.0 DeviantArt
Fanart Sadhira Sombra Uncloaked DeviantArt
Fanart Laken Interpretation Twitter
Fanart KittyAyome SOMBRA - Overwatch DeviantArt
Fanart KittyAyome Skycoder - Overwatch DeviantArt
Fanart Avizo-23 Who is Sombra DeviantArt
Twitch overlay for OBS Studio Akihabara GD Twitch overlay Mega

Easter Eggs

The following are collection of references and Easter Eggs encountered throughout the ARG.

In-Game

Sombra's "Amused" Emote

This character emote features the Skycode, accompanied by soft music resembling the Skysong. Sombra's expression is one of amusement, and it's a nod to the community's prolonged creative attempts to solving an nonexistent puzzle.

EmoteSkycode.png


Skycode Spray

This character spray features Sombra's iconic skull in front of a compass rose and the Skycode. This is a reference to both the cardinal directions used in one of the puzzles and to the Skycode, which is considered the most significant false lead that solvers encountered.

SkycodeSpray.png


In-ARG

Espresso Command

There is a hidden command in LumériCo's admin terminal. Inputting the word espresso will return the following message: Coffee Pot Status: Brewed approximately 23 hours ago, currently 0% full This is referencing a variety of emails found in the LumériCo site involving broken espresso machines and incompetent coffee brewing, which caught the attention of the community and gave way to a vast variety of mediocre jokes. Furthermore, "23 hours" makes reference to the number 23, which was believed by many to possess some sort of significance to the ARG, as Sombra would be the 23rd character in Overwatch. Finally, "0%" references the ARG's notable waiting periods that have been widely criticized by the community, specifically A Moment in Crime's upload percentage. Due to the iconic purple text it is believed that this hidden command was created by Sombra herself.

EspressoCommand.png


Media Appearances

3rd Aug. 2016

[EN] Kotaku - Overwatch Fans Find New Clues About The Mysterious Hero Sombra

[EN] Polygon - Overwatch fans are trying to crack the latest mystery about Sombra

[EN] PCGamesN - Overwatch's Sombra ARG continues with new clues, but no solutions

[EN] Team-Dignitas - Who is Sombra? All facts and clues about Sombra

[FR] Gamewave - UN NOUVEAU CODE CACHÉ DANS LA DERNIÈRE CINÉMATIQUE D'OVERWATCH!

[EN] FollowNews - Overwatch Fans Find New Clues About The Mysterious Hero Sombra

4th Aug. 2016

[EN] PCGamer - Overwatch Summer Games trailer hides a mysterious secret

[SK] Sector - Nové Overwatch video obsahuje ďalšie tajomstvá

[EN] Techinsider - 'Overwatch' players are going to insane lengths to solve a mystery that Blizzard's teased for months

[EN] Gamerant - Overwatch Players Uncover More ‘Sombra’ Clues

[HU] Gamestar - Overwatch - újabb nyomok utalnak a még be nem jelentett hősre

5th Aug. 2016

[EN] Kotaku - Days Later, Overwatch Fans Can't Figure Out The 'Sky Code' Mystery

[NL] Gamersnet - Cryptische speurtocht naar Overwatch' nieuwe heldin Sombra gaat bizar diep

[ES] Alfa Beta Jeuga - Overwatch: El enigma de Sombra sigue ofreciendo nuevos detalles

[EN] IGN (Video) - Sombra: Overwatch's Secret New Hero - Overwatch HQ

7th Aug. 2016

[EN] Gamespresso - Summary of the state of sombra's ARG in Overwatch

8th Aug. 2016

[EN/CN] Zhentoo - Overwatch new hero Secret Dorado hidden mystery

[EN] TechNewsToday - Overwatch: Sombra Continues to Elude Detectives

11th Aug. 2016

[EN] The Know - New Overwatch Hero Hints

12th Aug. 2016

[EN] Kotaku - Overwatch Fans' Sombra Investigation Reaps A Skull Code

14th Aug. 2016

[EN] Gamerant - Skull Code is Latest Clue in Overwatch’s Sombra Investigation

16th Aug. 2016

[EN] Christian Today - 'Overwatch' DLC update: Skull Code the latest clue for Sombra investigation

[EN] Yibada - 'Overwatch' DLC update: New clues on Sombra's inclusion to the roster revealed

23rd Aug. 2016

[EN] Tech News Today - Overwatch: All We Know About the Sombra ARG

24th Aug. 2016

[EN] Gamerant - Overwatch Forums Glitch Out, Reveals Hidden Message From Sombra

[EN] Gamerant - New Website Counts Down To Next Clue For Overwatch’s Sombra

[EN] Polygon - Overwatch's Sombra mystery appears to be coming to a close

[EN] VG247 - Overwatch forums glitch out, reveal a message from the mysterious Sombra

[EN] Tech News Today - Sombra Hacks Into Overwatch Forums

[EN] IGN - Overwatch Mystery Character Sombra Could Be Revealed Today

25th Aug. 2016

[EN] Kotaku - Overwatch Players Are Getting Sick Of The Sombra ARG

[EN] IGN - Overwatch Made the Internet Lose its Mind Last Night, And I Had a Front-Row Seat

[EN] Tech News Today - Overwatch: Countdown to Sombra


30th Aug. 2016

[EN] PC Gamer - Overwatch's Sombra riddle begins to irritate the players trying to solve it

3rd Oct. 2016

[EN] Mobile & Apps - Sombra To Be Revealed At Blizzcon? Halloween Event Confirmed In Data Leak

4th Oct. 2016

[EN] iTechPost - Overwatch Update: Are We Finally Getting Sombra?

11th Oct. 2016

[EN] Kotaku - Overwatch Fans Hacked Actual People In An Attempt To Find Sombra

17th Oct. 2016

[EN] TelKom Gaming - Will Sombra Hack Her Way Into BlizzCon 2016?

18th Oct. 2016

[EN] OverwatchTips - Everything You NEED To Know (Sombra ARG)

26th Oct. 2016

[EN] Min Network - Everything we know about Blizzard's rumored Nov. 1 release

28th Oct. 2016

[EN] Kotaku - Imagining Horror Stories Of A Never-Ending Overwatch ARG

1st Nov. 2016

[EN] IGN - Will Sombra be at BlizzCon 2016?

8th Nov. 2016

[EN] Mic Tech - 'Overwatch' Sombra ARG: Gameplay emote directly references one of the wildest fan theories