We've been tracking a resurgence of older breaches appearing in comb lists and credential stuffing attacks. While the individual impact of a 2017 breach might seem negligible, the reuse of credentials across platforms continues to be a significant risk. What really struck us wasn't the age of this particular breach of **GameWar**, an online store specializing in **MMORPG** accounts, but the fact that it contained plaintext passwords, a security practice that should have been retired long before 2017. The persistent failure to implement basic security measures like password hashing underscores the ongoing vulnerability of user accounts across the web.
The breach, impacting approximately **23,000** unique records, surfaced on a well-known hacking forum on **December 4, 2017**. The data included both email addresses and passwords stored in plaintext. The lack of even basic hashing algorithms meant that attackers could immediately access user accounts without needing to crack password hashes. The breach likely originated from a database compromise or a misconfigured server. This incident highlights the critical importance of secure password storage and the long-lasting impact of data breaches.
This incident matters to enterprises now because it underscores the continued risk of credential reuse. If users employed the same credentials for their GameWar accounts as they do for other services, including corporate accounts, their enterprise accounts are at risk. Plaintext password storage, while thankfully less common today, still exists, and old breaches can provide attackers with readily usable credentials for credential stuffing attacks against modern systems. This breach is a stark reminder of the importance of user education, password hygiene, and proactive threat hunting for leaked credentials.
Key point: Total records exposed: 23,215
Key point: Types of data included: Email Address, Plaintext Password
Key point: Source structure: Likely a database dump or export.
Key point: Leak location(s): Prominent hacking forum.
Key point: Date leaked: 04-Dec-2017
Security researcher Troy Hunt added the GameWar breach to Have I Been Pwned? shortly after it surfaced. This allowed affected users to check if their email addresses were compromised. This breach aligns with a broader trend of attackers targeting gaming platforms and online stores for user data. The relatively poor security practices of some of these platforms make them attractive targets. Many older breaches like this one are now being repackaged and sold as part of comb lists on Telegram channels and dark web marketplaces, further amplifying their potential impact.
Email · Address · Plaintext · Password
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security