DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Atari and Square Enix cough to exposing users’ privates

Posted on December 20, 2011 by Dissent

John Leyden reports:

Atari has apologised to gamers following a security breach that exposed their names and email addresses, leaving users at heightened risk of spam as a result.

The gaming outfit blamed the fairly minor breach (no credit cards or mobile phone numbers were exposed) on problems introduced during a migration to a new cloud-based server platform. The breach came to our attention via an Atari email (extract below) forwarded by Reg reader Troy, who commented: “Well, this sounds like fun, might explain all the recent spam I have been getting”.

Read more on The Register, although I would point out that as previously reported on this blog, Square Enix changed their assessment of the intrusion and its most recent update of December 19 affirms:

As a result of our continuing investigation, we have now confirmed that the database in which we store personal information was NOT accessed during the recent server intrusion. Therefore, your personal information was NOT compromised by an unknown third party.

No related posts.

Category: Breach IncidentsBusiness SectorHack

Post navigation

← UCLA Hospitals Sued Over Patient Data Breach
Security breach at MyVetDirect.com compromises security of customers’ credit card numbers →

1 thought on “Atari and Square Enix cough to exposing users’ privates”

  1. major tom says:
    December 22, 2011 at 7:19 am

    This is another breach from a gaming site(s). I often wonder if these breaches are all related to the type of or version of forum software or an access control, or even the coder/programmer that may have worked in these organizations that may have hopped from job to job. Not to say that the person is bad, maybe just bad at the code they have produced or “Plauge”erized.

    If I had a well established forum or board that had a high number of visitors, and I see other gaming sites getting whacked, the FIRST thing I would not say is, ahhhh thats too bad, haha.

    They should be dialing up the operations team and asking them how many versions are they behind when it comes to the version of PHP, MYSQL and the forum software. I am sure there is a glitch somewhere that doesn’t do bounds checking, and the hackers are getting in.

    Some sites do win the Bozo award for having lax security when it comes to passwords. I have seen many a writeup of passwords being extremely easy. It DOES start with the companies that make items, setting passwords to something very easy. Its just as easy to create some step that requires the new equipment to have the password changed immediately upon accessing it for the first time. Then about 10% of the breaches may not happen.

    Sites that have username and passwords with admin level functions need to be closely watched.Ensure the root, admins and general users of the *SQL databases, and access to the admin side of the forum/website have strong passwords that are changed out at least every 6 months, and are not used anywhere else.

    With the ton of breaches that have occurred, its important to note that if a username and password combo is used in more than one place, the likelihood of it staying secure somewhere else is probably not very good at all.

    Hackers like the shock and awe of having massive numbers affected when they do a breach. I am sure thats not the only reason they do what they do, but it definately makes heads turn when they do.

    These places get comfortable with the cash, and lose grip on security of the site at hand. Then, they end up handing that fistful of cash over to fines, reconstruction or cleanup costs and such. Its like they like the challenge or possibility of being hacked.

    Its not all about new and shiny technology that will save them ; that as well will only be as good as the security that surrounds it.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
  • Five youths arrested on suspicion of phishing
  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.