We've been tracking the resurgence of older forum breaches appearing in aggregated credential stuffing lists. What caught our attention with a recent sample was the consistent presence of usernames and email addresses associated with the Unreal Engine Forum, dating back to a breach in August 2016. While the number of directly exposed credentials in this sample was relatively small, the age and continued relevance of Unreal Engine as a development platform elevates the risk profile for potentially exposed developers and their projects. The persistence of this data highlights the long tail of risk associated with older breaches, especially when they target platforms used by security-conscious professionals.
In August 2016, the Unreal Engine Forum, a platform for developers using the Unreal Engine game engine, experienced a significant data breach. Initial reports suggested a SQL injection vulnerability in the vBulletin forum software was the likely cause. This attack led to the exposure of a database containing approximately 530,000 accounts. While the breach itself is not new, its impact continues to be felt as the exposed credentials appear in modern credential stuffing attacks. The longevity and continued relevance of Unreal Engine mean that compromised accounts can still be used to target developers and their projects, potentially injecting malware or stealing proprietary code.
The breach originally caught attention due to its scale and the potential impact on the game development community. While the leaked data included usernames and email addresses, the passwords were stored as salted MD5 hashes. However, even with hashing, older MD5 implementations are vulnerable to cracking, especially when combined with common passwords. The recent resurgence of these credentials in credential stuffing lists suggests that many users may not have updated their passwords since the breach, or may have reused the same password across multiple platforms.
This incident matters to enterprises because it underscores the long-term risks associated with data breaches, particularly those affecting platforms used by technical professionals. The Unreal Engine is widely used in game development, film production, and architectural visualization, making the accounts of its developers valuable targets. The automated nature of modern credential stuffing attacks means that even seemingly old and low-value data can be leveraged to gain unauthorized access to sensitive systems and intellectual property.
Key point: Total records exposed: 530,000 accounts (initially)
Key point: Types of data included: Usernames, email addresses, salted MD5 hashes of passwords
Key point: Sensitive content types: Potentially exposes access to Unreal Engine development tools and projects
Key point: Source structure: Database
Key point: Leak location(s): Initially reported on various breach notification sites and forums; now circulating in aggregated credential stuffing lists.
Key point: Date leaked: 11-Aug-2016
News outlets such as BleepingComputer covered the initial breach in 2016, highlighting the potential risks to Unreal Engine users. Security researchers have also noted the increasing prevalence of older breaches appearing in credential stuffing attacks, as attackers recycle previously compromised data to gain access to new targets.
While specific forum threads discussing the re-emergence of this data are difficult to pinpoint due to the transient nature of such discussions, general chatter on security forums and Telegram channels often mentions the use of older breach datasets in credential stuffing campaigns. One common tactic is to combine data from multiple breaches to create comprehensive lists of potential credentials, increasing the likelihood of a successful attack.
None
See if your personal information has been exposed in data breaches
Scan to sign up instantly
We found your data exposed in multiple breaches. This includes:
Your information is protected by enterprise-grade security