Just as everyone is looking to immerse themselves in the world of Fallout, players have been greeted with an unpleasant holiday surprise as a glitch has caused an inventory hack that allows honorable players to dump all of it inventories by simply being in the same premise as the targets.
The Fallout 76 inventory hack was pushed immediately after a different hack that allowed users to access generation on servers with large amounts of legendary items, some with more statistics than the standard allowed. However, the first glimpse into the Fallout 76 inventory hack was first noted by Reddit user TKsMantis, who was notified of the next hack. Based on the post, the Fallout 76 hack allows players to access their inventories on PC by being close by with them. What is surprising is that the hacker does not need to see the target once he is close to 200 of the targets. Not only that, the hack can do it. In addition, players will lose the PipBoy.
In the meantime, the Fallout 76 inventory hack has several videos showing hackers emptying player inventories. Fallout 76 Players Was Welcomed With An Unpleasant Holiday Surprise As A Glitch Permits Hackers To Empty Inventories According to the handful of Fallout 76 Reddit, the Fallout 76 inventory hack is intended to target player inventories. With the security of each hidden object, all that the hacker needs is access to the target, and within seconds, their parts in the hideout would disappear.
The solution is now the Fallout 76 private servers. But there is a catch; they are exclusively reserved for Fallout 1st subscribers. Other options include playing with a lower-level character whose items are not from a mission that involves long-term investments or to store items in the supply.
For those who want justice and courageous enough to face the Appalachians and its multitude of laws, then denouncing pirates will be highly recognized. However, Reddit user TKsMantis noted in his article that Bethseda is fully aware of their current plight with the Fallout 76 inventory hack and is making efforts and working on it even before the hack is deployed. However, at the time of this writing, there is not yet an official answer on this subject.