Cryptic reveals accounts breach to users
Cryptic Studios alerted users today of a security breach from 2010 where a hacker got into account and password information.
An effort by Cryptic Studios to enhance security on its servers and its databases uncovered a breach from 2010 where the unauthorized intruder had access to account names, encrypted passwords and other account information.
In an email to users today and a post on it website, Cryptic said the hacker had breach one of its user databases:
The unauthorized access included user account names, handles, and encrypted passwords for those accounts. Even though the passwords were encrypted, it is apparent that the intruder has been able to crack some portion of the passwords in this database. All accounts that we believe were present in the database have had the passwords reset, and customers registered to these accounts have been notified via e-mail of this incident.
Cryptic also believes the hacker may have had access to additional information such as player names, birth dates and partial credit card details, but there was no evidence that any of this information was taken.
The company, which handles such MMOs as Star Trek Online, Champions Online and the upcoming Neverwinter, said they are continuing to monitor the situation and ask its users to do the same.
(Correction: We had originally reported that Cryptic handled City of Heroes. The studio developed the game, but it is owned and operated by NCsoft. We regret the error)
-
John Keefer posted a new article, Cryptic reveals accounts breach to users.
Cryptic Studios alerted users today of a security breach from 2010 where a hacker got into account and password information.-
-
-
-
-
Cryptic has -nothing- to do with City of Heroes other than a handful of remaining sprite & sound royalties, and it's been that way for almost FIVE years now (2007 I think). Three years before the breach mentioned in this story.
NCSoft & Paragon Studios would probably appreciate the correction, as *their* City of Heroes customers are in no way tied to this. -
-
-
-
-
I do not see how him offering an opinion on the origin of spam in a once-only account is a troll. He cites that he has (anecdotal) evidence that their statement is incorrect.
I use the same method for registrations thanks to google mail aliasing. I have not checked if my account for Cryptic was compromised, so I cannot offer an opinion, but dismissing his post as a 'troll' simply because you disagree with his opinion, and my summation of that where I answer your sarcastic question, is immature. Just as your sarcastic rejoinder at the end of this post that I am replying to is.
You should try to be more polite.-
Yes, I have my own domains and use unique mail aliases for every new registration. If one starts getting spam, I know exactly who leaked it and can simply redirect that address to null at the server.
It's worth noting that I had multiple accounts with Cryptic (for their various games), using different addresses. At least two of them were getting the exact same spams starting around the time of the breach.
-
-
-
-
Haha, then what does it matter? You don't use it for anything else..
It matters because it plainly contradicts their claim that there was no evidence of any leakage aside from names and hashes.
It was obvious to me at the time that their system had been compromised, and that attackers had obtained that single-use-email-alias-on-a-private-domain (long since redirected to /dev/null as I do with any such compromised aliases). Nobody else was ever provided with that unique address.
I even vaguely recall pointing out the likely compromise to their support department when it started, though that may have been another MMO company who was similarly compromised that I did that for.
-
-
-
-