Skip to main content

Town of Salem Data Breach Exposes 7.6 Million Gamers' Accounts

Town of Salem Data Breach Exposes 7.6 Million Gamers' Accounts

town of salem data breach
A massive data breach at the popular online role-playing game 'Town of Salem' has reportedly impacted more than 7.6 million players, the game owner BlankMediaGames (BMG) confirmed Wednesday on its online forum.

With the user base of more than 8 million players, Town of Salem is a browser-based game that enables gamers (which range from 7 to 15 users) to play a version of the famous secret role game Town, Mafia, or Neutrals.

The data breach was first discovered and disclosed on December 28 when a copy of the compromised Town of Salem database was anonymously sent to DeHashed, a hacked database search engine.

Over 7.6 Million Users Accounts Compromised


The database included evidence of the server compromise and access to the complete gamer database which contained 7,633,234 unique email addresses (most-represented of the email providers being Gmail, Hotmail, and Yahoo.com).

After analyzing the complete database, DeHashed disclosed that the compromised data contained the following information on Town of Salem players:

  • Email addresses
  • Usernames
  • Hashed passwords (in phpass, MD5(WordPress), and MD5(phpBB3) formats)
  • IP addresses
  • Game and forum activity
  • Some payment information (including full names, billing and shipping addresses, IP information and payment amount).

DeHashed also stated that "some of the users who paid for certain premium features having their billing information/data breached as well," though BlankMediaGames confirmed that no credit-card numbers were exposed in the breach.
"We do not handle money. At all. The third party payment processors are the ones that handle all of that," a company's spokesperson said on the official Town of Salem game forum on January 2 while confirming the breach.
"We never see your credit card, payment information, anything like that. We don't have access to that information."
Town of Salem developers addressed the security incident Wednesday by removing three separate, malicious PHP files (which render HTML content for viewing in the browser) from their web server that allowed the attacker to have a backdoor into their server.

The company is also in the process of contacting security auditing firms and potentially discussing reinstalling all of its "servers from scratch just to be 100% sure."

Account Passwords Stored Using Insecure MD5 Hashing Algorithm


Although the game developers said that each password was stored in their database as a "salted MD5 hash," the game players are highly recommended to change their passwords as soon as possible because the MD5 hash function has long been known to be susceptible to brute force attacks.

The MD5 hashing algorithm is widely considered to be extremely insecure, following the leaking of more than 117 million LinkedIn passwords that had been hashed similarly and brute-forced to get the plain text passwords.

BlankMediaGames is expected to be changing up its password-hashing approach, as the company said: "We are making plans to replace PHPBB with a more secure forum such as Vanilla, and moving to a more secure hashing algorithm."

BlankMediaGames says it will soon be sending out mass emails to all Town of Salem users impacted by the data breach but adds that its number one priority currently is to ensure that its "servers are secure" and to add support in its code for "forced password resets."

Contact us:

Red Securium Pvt Limited Company

Red securium company provide best ethical hacking  and cyber security training in noida.

Address: Block A, A-25, Second Floor, Sector 3, Noida, Uttar Pradesh 201301
Telephone number: +91-120 429 1672
Email: info@redsecurium.org
Mobile number: +91-7455923827
Google+ Profile: Red Securium
Facebook profile: Red Securium
Twitter Profile: Red Securium
Instagram Profile: Red Securium

Comments

Popular posts from this blog

Tr0ll 1.0 – Vulnhub CTF Challenge Walkthrough

  Tr0ll 1.0 is an intentionally vulnerable machine, which is more of a   CTF  like type than real world scenario. Nevertheless, this machine has its own difficulties and you can learn some new stuff from it. So, let’s start. Enumeration Phase Let’s first run  netdiscover  to find the IP of our machine. netdiscover -r 192.168.1.1/24 After that, we run our typical  nmap  scan to see the open ports in the machine. nmap -A -sS -Pn -vv [target] Great we see many interesting stuff here. First of all, there is an open  FTP  port and we can connect to it with  anonymous access .  Also there is an open  http  port, we will run a nikto scan for it. The  ssh  port will be valuable later. From the nikto scan we got an interesting  /secret/  folder. When we get inside, we can understand why the machine got this name. Nothing interesting here, as you can see. we got trolled Let’s connect to the ftp server. When we get asked for the username we type ‘ anonymous ‘ and we l

Digital Marketing Services in noida

Red Securium Company Provide Digital Marketing Service In Noida Strengthen your brand positioning, awareness, revenue objectives and market share with our custom-built digital marketing services to suit their business needs. Get easily accessible to your target audience on mobiles and social networking sites across different platforms. Our cross-functional digital marketing experts offer end-to-end digital marketing solutions that are in step with your business's goals and policies. Our targeted digital marketing campaigns are custom-structured for helping you in strengthening your brand positioning, awareness, revenue objectives and market share. Digital Marketing Services  Digital Marketing Service  Social Network Marketing Service Seo Services Marketing  PPC Marketing Service  Social Media Marketing Sales Generation Services  Mobile Marketing Service  Content Marketing Service Event Marketing Service  Video Marketing Service Video Lo

Uber fined $1.1 million by UK and Dutch regulators over 2016 data breach

British and Dutch data protection regulators Tuesday hit the ride-sharing company Uber with a total fine of $1,170,892 (~ 1.1 million) for failing to protect its customers’ personal information during a 2016 cyber attack involving millions of users. Late last year, Uber unveiled that the company had suffered a  massive data breach  in October 2016, exposing names, email addresses and phone numbers of 57 million Uber riders and drivers along with driving license numbers of around 600,000 drivers. Besides this, it was also reported that instead of disclosing the breach at the time, the company  paid $100,000 in ransom  to the two hackers with access to the stolen data in exchange for keeping the incident secret and deleting the information. Today Britain’s Information Commissioner’s Office (ICO)  fined  Uber 385,000 pounds ($491,102), while the Dutch Data Protection Authority (Dutch DPA)  levied  a 600,000 euro ($679,790) penalty on Uber for failing to protect the personal informa