DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atari and Square Enix cough to exposing users’ privates

Posted on December 20, 2011 by Dissent

John Leyden reports:

Atari has apologised to gamers following a security breach that exposed their names and email addresses, leaving users at heightened risk of spam as a result.

The gaming outfit blamed the fairly minor breach (no credit cards or mobile phone numbers were exposed) on problems introduced during a migration to a new cloud-based server platform. The breach came to our attention via an Atari email (extract below) forwarded by Reg reader Troy, who commented: “Well, this sounds like fun, might explain all the recent spam I have been getting”.

Read more on The Register, although I would point out that as previously reported on this blog, Square Enix changed their assessment of the intrusion and its most recent update of December 19 affirms:

As a result of our continuing investigation, we have now confirmed that the database in which we store personal information was NOT accessed during the recent server intrusion. Therefore, your personal information was NOT compromised by an unknown third party.

Category: Breach IncidentsBusiness SectorHack

Post navigation

← UCLA Hospitals Sued Over Patient Data Breach
Security breach at MyVetDirect.com compromises security of customers’ credit card numbers →

1 thought on “Atari and Square Enix cough to exposing users’ privates”

  1. major tom says:
    December 22, 2011 at 7:19 am

    This is another breach from a gaming site(s). I often wonder if these breaches are all related to the type of or version of forum software or an access control, or even the coder/programmer that may have worked in these organizations that may have hopped from job to job. Not to say that the person is bad, maybe just bad at the code they have produced or “Plauge”erized.

    If I had a well established forum or board that had a high number of visitors, and I see other gaming sites getting whacked, the FIRST thing I would not say is, ahhhh thats too bad, haha.

    They should be dialing up the operations team and asking them how many versions are they behind when it comes to the version of PHP, MYSQL and the forum software. I am sure there is a glitch somewhere that doesn’t do bounds checking, and the hackers are getting in.

    Some sites do win the Bozo award for having lax security when it comes to passwords. I have seen many a writeup of passwords being extremely easy. It DOES start with the companies that make items, setting passwords to something very easy. Its just as easy to create some step that requires the new equipment to have the password changed immediately upon accessing it for the first time. Then about 10% of the breaches may not happen.

    Sites that have username and passwords with admin level functions need to be closely watched.Ensure the root, admins and general users of the *SQL databases, and access to the admin side of the forum/website have strong passwords that are changed out at least every 6 months, and are not used anywhere else.

    With the ton of breaches that have occurred, its important to note that if a username and password combo is used in more than one place, the likelihood of it staying secure somewhere else is probably not very good at all.

    Hackers like the shock and awe of having massive numbers affected when they do a breach. I am sure thats not the only reason they do what they do, but it definately makes heads turn when they do.

    These places get comfortable with the cash, and lose grip on security of the site at hand. Then, they end up handing that fistful of cash over to fines, reconstruction or cleanup costs and such. Its like they like the challenge or possibility of being hacked.

    Its not all about new and shiny technology that will save them ; that as well will only be as good as the security that surrounds it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.