DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atari and Square Enix cough to exposing users’ privates

Posted on December 20, 2011 by Dissent

John Leyden reports:

Atari has apologised to gamers following a security breach that exposed their names and email addresses, leaving users at heightened risk of spam as a result.

The gaming outfit blamed the fairly minor breach (no credit cards or mobile phone numbers were exposed) on problems introduced during a migration to a new cloud-based server platform. The breach came to our attention via an Atari email (extract below) forwarded by Reg reader Troy, who commented: “Well, this sounds like fun, might explain all the recent spam I have been getting”.

Read more on The Register, although I would point out that as previously reported on this blog, Square Enix changed their assessment of the intrusion and its most recent update of December 19 affirms:

As a result of our continuing investigation, we have now confirmed that the database in which we store personal information was NOT accessed during the recent server intrusion. Therefore, your personal information was NOT compromised by an unknown third party.


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsBusiness SectorHack

Post navigation

← UCLA Hospitals Sued Over Patient Data Breach
Security breach at MyVetDirect.com compromises security of customers’ credit card numbers →

1 thought on “Atari and Square Enix cough to exposing users’ privates”

  1. major tom says:
    December 22, 2011 at 7:19 am

    This is another breach from a gaming site(s). I often wonder if these breaches are all related to the type of or version of forum software or an access control, or even the coder/programmer that may have worked in these organizations that may have hopped from job to job. Not to say that the person is bad, maybe just bad at the code they have produced or “Plauge”erized.

    If I had a well established forum or board that had a high number of visitors, and I see other gaming sites getting whacked, the FIRST thing I would not say is, ahhhh thats too bad, haha.

    They should be dialing up the operations team and asking them how many versions are they behind when it comes to the version of PHP, MYSQL and the forum software. I am sure there is a glitch somewhere that doesn’t do bounds checking, and the hackers are getting in.

    Some sites do win the Bozo award for having lax security when it comes to passwords. I have seen many a writeup of passwords being extremely easy. It DOES start with the companies that make items, setting passwords to something very easy. Its just as easy to create some step that requires the new equipment to have the password changed immediately upon accessing it for the first time. Then about 10% of the breaches may not happen.

    Sites that have username and passwords with admin level functions need to be closely watched.Ensure the root, admins and general users of the *SQL databases, and access to the admin side of the forum/website have strong passwords that are changed out at least every 6 months, and are not used anywhere else.

    With the ton of breaches that have occurred, its important to note that if a username and password combo is used in more than one place, the likelihood of it staying secure somewhere else is probably not very good at all.

    Hackers like the shock and awe of having massive numbers affected when they do a breach. I am sure thats not the only reason they do what they do, but it definately makes heads turn when they do.

    These places get comfortable with the cash, and lose grip on security of the site at hand. Then, they end up handing that fistful of cash over to fines, reconstruction or cleanup costs and such. Its like they like the challenge or possibility of being hacked.

    Its not all about new and shiny technology that will save them ; that as well will only be as good as the security that surrounds it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.