Data leak
Blizzard Entertainment Battle.net Breach β 14 Million Accounts
Primary Source βIncident Details
On 4 August 2012, Blizzard Entertainment β maker of World of Warcraft, Diablo, and StarCraft β discovered that an unauthorized party had illegally accessed their internal network and obtained information from the Battle.net user database for accounts in the Americas region (US, Canada, Mexico, Australia, New Zealand, Southeast Asia). Blizzard disclosed the breach on 9 August 2012. Exposed data included email addresses, security question answers (cryptographically scrambled), mobile and dial-in authenticator information, and cryptographic hashes of passwords (using SRP β Secure Remote Password protocol β not traditional password hashing). Actual passwords were not directly exposed but the SRP verifiers could theoretically be used to verify guesses. No credit card or billing information was accessed (stored in separate systems). Blizzard immediately emailed all affected accounts and prompted security question resets. The breach is notable for occurring at a major gaming company with tens of millions of users at the peak of World of Warcraft’s popularity. Blizzard handled the disclosure well and rapidly β notifying users within 5 days of discovery and providing clear technical detail about what was and was not compromised. The use of SRP protocol rather than traditional password hashing, while more complex, proved to be a security advantage in this incident.
Technical Details
- Initial Attack Vector
- An unauthorized party illegally accessed Battle.net's internal network and obtained information from Blizzard's user database; the specific intrusion vector was not disclosed; the attacker gained access to database servers in the Americas region
- Vendor / Product
- Blizzard Entertainment Battle.net user database
Timeline
- 2012-08-04 Breach occurred
- 2012-08-09 Publicly disclosed
- 2012-08-09 Customers notified