DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

XSplit Password Reset Alert – Protecting Your Twitch Account

Posted on November 7, 2013 by Dissent

The following was posted yesterday on Twitch:

Attention Broadcasters:

If you are currently or have in the past used XSplit to stream to Twitch, please read this carefully.

It has come to our attention that various data on XSplit’s servers have been compromised. In particular, your XSplit credentials (account name and password), as well as your Twitch account name and stream key may have been exposed. Such exposure might allow an external party to broadcast to your Twitch channel.

Please see this XSplit announcement for more details.

We want to reassure you that no Twitch data was compromised directly through Twitch. If you use a universal password across multiple sites, however, this may allow compromise of your Twitch account and other accounts.

To protect your Twitch account, we recommend that you reset the stream key on your Twitch channel.

In addition, if you have shared your password between your XSplit and Twitch account, we also advise you to:

  • Change the password on your Twitch account.
  • Change the passwords of any other accounts which you shared this password with.

Just a reminder, we encourage all users of the Twitch service to follow best practices for security when creating and managing passwords on your account. These include:

  • Never sharing your password with another account.
  • Creating a strong password that can’t be easily guessed or attacked via brute force. Test your new password by using this tool.

Using a password manager such as 1Password or LastPass.

The related announcement says:

XSplit Password Reset Alert
Date Posted: 07 NOV 2013

For the security of all our users we’re issuing a system wide password reset request, due to reports of suspicious activity.

We believe that various data on XSplit’s servers may have been compromised; In particular, your XSplit account name and password, as well as account name and stream key for live streaming services that you have used.

We are currently in the process of setting up a password reset page. Once it is live, users will be able to reset their password by entering their username. This will then send an email to users’ email inbox, allowing them to reset their password.

*We will update this blog post with a link to the password reset page, as soon as it goes live*

  • We want to reassure you that NO paypal or credit card payment information is stored with XSplit account data.
  • We encourage you to update your password(s) across any other sites where you use the same or similar password(s)

We thank you for your patience and understanding.

– The XSplit Team


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
  • Qantas obtains injunction to prevent hacked data’s release
  • Ransomware attack disrupts Korea's largest guarantee insurer
Category: Business SectorHack

Post navigation

← Baltimore police officer pleads to extortion and ID theft
DaVita notifies dialysis patients of breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hackers post stolen St. Paul data online as efforts to reset city employee passwords surge forward
  • Justice Department Announces Coordinated Disruption Actions Against BlackSuit (Royal) Ransomware Operations
  • NL: Hackers breach cancer screening data of almost 500,000 women
  • Violent Crypto Crimes Surge in 2025 Amid Massive Data Leaks
  • Why Ransomware Attacks Are Decreasing in 2025
  • KR: Yes24, the largest Internet bookstore in Korea, suffered its second ransomware attack in two months
  • Korea wins world’s top hacking contest for 4th consecutive year
  • 7-Zip Vulnerability Lets Hackers Write Files and Run Malicious Code
  • Connex Credit Union notifies 172,000 members of hacking incident
  • Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks (CORRECTED)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Navigating Privacy Gaps and New Legal Requirements for Companies Processing Genetic Data
  • Germany’s top court holds that police can only use spyware to investigate serious crimes
  • Flightradar24 receives reprimand for violating aircraft data privacy rights
  • Nebraska Attorney General Sues GM and OnStar Over Alleged Privacy Violations
  • Federal Court Allows Privacy Related Claims to Proceed in a Proposed Class Action Lawsuit Against Motorola
  • Italian Garante Adopts Statement on Health Data and AI
  • Trump administration is launching a new private health tracking system with Big Tech’s help

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.