• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 18:17
CET 00:17
KST 08:17
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
TL.net Map Contest #21: Winners2Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10[ASL20] Finals Preview: Arrival13TL.net Map Contest #21: Voting12[ASL20] Ro4 Preview: Descent11
Community News
Starcraft, SC2, HoTS, WC3, returning to Blizzcon!20$5,000+ WardiTV 2025 Championship5[BSL21] RO32 Group Stage3Weekly Cups (Oct 26-Nov 2): Liquid, Clem, Solar win; LAN in Philly2Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win9
StarCraft 2
General
TL.net Map Contest #21: Winners Starcraft, SC2, HoTS, WC3, returning to Blizzcon! RotterdaM "Serral is the GOAT, and it's not close" Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win 5.0.15 Patch Balance Hotfix (2025-10-8)
Tourneys
$5,000+ WardiTV 2025 Championship Constellation Cup - Main Event - Stellar Fest Merivale 8 Open - LAN - Stellar Fest Sea Duckling Open (Global, Bronze-Diamond) $3,500 WardiTV Korean Royale S4
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 498 Wheel of Misfortune|Cradle of Death Mutation # 497 Battle Haredened Mutation # 496 Endless Infection Mutation # 495 Rest In Peace
Brood War
General
BGH Auto Balance -> http://bghmmr.eu/ SnOw's ASL S20 Finals Review [BSL21] RO32 Group Stage Practice Partners (Official) [ASL20] Ask the mapmakers — Drop your questions
Tourneys
[Megathread] Daily Proleagues [BSL21] RO32 Group B - Sunday 21:00 CET [BSL21] RO32 Group A - Saturday 21:00 CET BSL21 Open Qualifiers Week & CONFIRM PARTICIPATION
Strategy
Current Meta How to stay on top of macro? PvZ map balance Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Stormgate/Frost Giant Megathread Dawn of War IV Nintendo Switch Thread ZeroSpace Megathread General RTS Discussion Thread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread SPIRED by.ASL Mafia {211640}
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine YouTube Thread Dating: How's your luck?
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece Korean Music Discussion Series you have seen recently...
Sports
2024 - 2026 Football Thread NBA General Discussion MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List Recent Gifted Posts
Blogs
Saturation point
Uldridge
DnB/metal remix FFO Mick Go…
ImbaTosS
Why we need SC3
Hildegard
Career Paths and Skills for …
TrAiDoS
Reality "theory" prov…
perfectspheres
Our Last Hope in th…
KrillinFromwales
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1306 users

Blizzard Security Breach - Page 19

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 17 18 19 20 21 23 Next All
Daehlie
Profile Joined September 2010
United States43 Posts
August 10 2012 16:38 GMT
#361
My passwords, they feel so dirty and used. I'll be in the shower until I feel clean again.
SK.MC ftw
Panthae
Profile Joined May 2011
Canada205 Posts
August 10 2012 16:48 GMT
#362
Im pretty sure people who have D3 are in more trouble than people that have SC2.
For Aïur?
HolydaKing
Profile Joined February 2010
21254 Posts
August 10 2012 16:58 GMT
#363
On August 11 2012 01:48 Panthae wrote:
Im pretty sure people who have D3 are in more trouble than people that have SC2.

I'm pretty sure many if not most have both of them. Still you are of course right in terms of value of the account.
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 16:58 GMT
#364
On August 11 2012 00:48 kubiks wrote:
Show nested quote +
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


What a lot of rainbow tables did when they started a long time ago is not to randomly generate stuff but instead gather cleartext passwords from a lot of sources and then started from there. Since a lot of people use similar passwords it already covered 75% of all passwords that way.

Now that storage has become cheap those databases are so huge that basically any <8 character password is covered for most of the common hashing algorithms and the only thing you can hope for if your password is that short is that the password has a good salt.
snively
Profile Blog Joined August 2011
United States1159 Posts
Last Edited: 2012-08-10 17:04:39
August 10 2012 17:03 GMT
#365
changed password. i hope its enough o_O
My religion is Starcraft
Deleted User 101379
Profile Blog Joined August 2010
4849 Posts
August 10 2012 17:05 GMT
#366
On August 11 2012 02:03 snively wrote:
Show nested quote +
On August 10 2012 22:46 ThirdDegree wrote:
I got the following email last sunday:

+ Show Spoiler +
We've received a request to reset the password for this Battle.net account. Please click this link to reset your password:
https://us.battle.net/account/support/password-reset-confirm.......

If you no longer wish to make the above change, or if you did not initiate this request, please disregard and/or delete this e-mail.

If you have any questions regarding your Battle.net account, click here for answers to frequently asked questions and contact information for the Blizzard Billing & Account Services team.

Sincerely,
The Battle.net Account Team
Online Privacy Policy


I suppose this might be connected.


i got this too. can anyone confirm if its legit?


Did you click on the "reset password" button? If not, delete that mail.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 17:31 GMT
#367
On August 10 2012 23:10 Nizaris wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.

http://www.teamliquid.net/forum/viewmessage.php?topic_id=359393&currentpage=17#328
http://www.teamliquid.net/forum/viewmessage.php?topic_id=359393&currentpage=18#350
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 17:34 GMT
#368
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.
rast
Profile Joined July 2012
Poland44 Posts
Last Edited: 2012-08-10 18:01:36
August 10 2012 18:00 GMT
#369
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.
MrTortoise
Profile Joined January 2011
1388 Posts
Last Edited: 2012-08-10 18:15:23
August 10 2012 18:04 GMT
#370
tbh given the extent they were compramised they seem to of actually got their security right

good job blizz.


The point is the security bought TIME. That is all it can buy.
Your accoutn could be hacked directly through permutations of passwords directly ito the client... that would take hundreds of years.
This gives them a short cut but it still gives users a decent amount of time untill a significant proportion of passwords get cracked


Personally i use bcrypt on one of its hardest settings to hash things ... but that is because i can afford to.

As a developer who comes down on any security breach like a ton of bricks (we havent found out how and if it turns out to be a sql injection attack i will reverse this statement VERY quickly) - it seem like blizzard has done a lot of what is reasonable to secure things.

SHA1 is recognised as a good strong hash. Its only weakness is that it is quite a quick hash and so not the best choice for password hashing (it is great for h ashing LARGE file streams) - where you want to choose a slow algorithm as that massivley reduces number of guesses pe5r second.

The problem with slow algorithms is that they EAT cpu ... and go back to D3 release when authentication servers kept falling over. You see the really hard spot they were in ... ie they seemingly couldn't afford to use blowfish due to the scale of their operations as their servers cant cope with a fast sha1 algorithm.
cLAN.Anax
Profile Blog Joined July 2012
United States2847 Posts
August 10 2012 18:16 GMT
#371
Gaaah. I have to get on Battle.net again, lol. Thanks for the warning, and I'm glad they're working to take care of it. :-)
┬─┬___(ツ)_/¯ 彡┻━┻ I am the 4%. "I cant believe i saw ANAL backwards before i saw the word LAN." - Capped
Viliphied
Profile Joined July 2012
United States2 Posts
August 10 2012 18:16 GMT
#372
On August 11 2012 00:55 DertoQq wrote:
Show nested quote +
On August 10 2012 23:18 Gorsameth wrote:
On August 10 2012 23:10 Nizaris wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.


This thread is clearly talking about some hackers managing to get the hash pw of users. Brute Force / Dictionary attacks / Rainbow tables is not only "viable", but it is the only way to use those hash. Having a complicated password is the only thing you can do to prevent having issues with that.


The thing is, if your password is 8+ characters of only lower case and numbers, adding another character adds more complexity than adding case sensitivity.
DertoQq
Profile Joined October 2010
France906 Posts
August 10 2012 18:32 GMT
#373
On August 11 2012 03:16 Viliphied wrote:
Show nested quote +
On August 11 2012 00:55 DertoQq wrote:
On August 10 2012 23:18 Gorsameth wrote:
On August 10 2012 23:10 Nizaris wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.

hahaha. goes to show how clueless you are. case sensitive passwords are allot harder to crack then case insensitive since 'a' and 'A' are 2 different letters therefore u have exponentially more possibilities.

It pisses you off that websites forces you not to use a retarded password ? some ppl...

who uses upper cases letter in their passwords ? smart ppl do.


Actualy it barely matters at all. Brute forcing passwords (the only situation in which A/a matters) is just not viable. Keyloggers / man in the middle / other security breaches are how passwords get stolen. Not some computer trying out a trillion possible combinations.


This thread is clearly talking about some hackers managing to get the hash pw of users. Brute Force / Dictionary attacks / Rainbow tables is not only "viable", but it is the only way to use those hash. Having a complicated password is the only thing you can do to prevent having issues with that.


The thing is, if your password is 8+ characters of only lower case and numbers, adding another character adds more complexity than adding case sensitivity.


True, but I was responding to a post saying that password complexity doesn't matter because hackers won't brute force it, which is completely false.

Password complexity is really important. Upper case DO increase it, even though it is not needed because you can achieve better results by increasing the length.
"i've made some empty promises in my life, but hands down that was the most generous" - Michael Scott
NIIINO
Profile Blog Joined July 2010
Slovakia1320 Posts
August 10 2012 19:11 GMT
#374
What if they hacked Mikes mail too, so they can ask us to change our passwords on the site they are monitoring ?
Shenghi
Profile Joined August 2010
167 Posts
August 10 2012 19:17 GMT
#375
On August 11 2012 04:11 NIIINO wrote:
What if they hacked Mikes mail too, so they can ask us to change our passwords on the site they are monitoring ?

Then just follow the golden rule: Blizzard will never ask you for your password.
People are not born stupid, they choose to be stupid. If you made that choice, please change your mind.
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
Last Edited: 2012-08-10 19:38:21
August 10 2012 19:37 GMT
#376
On August 11 2012 01:58 Morfildur wrote:
Show nested quote +
On August 11 2012 00:48 kubiks wrote:
On August 10 2012 23:20 rast wrote:
Most peaple here doesn't realise the fact that their stolen hashes are probably decyphered into their passwords already by said hackers. Nowadays hackers doesn't needs to crack your hash to get the passwords. There's a thing called "rainbow tables", which is basically hugh dictionary containing the password and its possible hash. Those tables are traded between hacking organisations. If somebodie acuires your hash and has access to this rainbow table all he needs to do is look up possible password which generate mentioned hash. Also as someone stateb before, the algorithm used to hash the password can be determined just by looking at sample hashes, to some extent.

Also there's a confusion in this topic between the protocol and actual authenticatuion. SRP is just a protocol which "carry" your password between diffrent services, similar to SSH. It has no use in authentication process, which essentially checks if your password is correct or not. Whether Blizz implemented any kind of protocol is irrelevant to actual authentication mechanism, which tends to be just converting your password into hash.

The true question is how good is Blizz mechanism of storing passwords is, does the hashes ware generated using "salt", are salt stored in same DB etc. No info given by them on this matter and unfortunately the IT tends to treat such matters really poorly.

Long story short - it would be best for everyone affected to change the password everywhere they are using it .


Not sure if I understand what a "rainbow table" is, but if your password isn't a word of the dictionnary, how can thoses tables can store all the passwords and his hash ? I understand if the pass is less than 6 caracter long, but beyond it just look like this kind of table would just be way too big...(as, too big to be stored on anything)


What a lot of rainbow tables did when they started a long time ago is not to randomly generate stuff but instead gather cleartext passwords from a lot of sources and then started from there. Since a lot of people use similar passwords it already covered 75% of all passwords that way.

Now that storage has become cheap those databases are so huge that basically any <8 character password is covered for most of the common hashing algorithms and the only thing you can hope for if your password is that short is that the password has a good salt.

To simplify the difference between bruteforce and rainbow tables. Bruteforce uses process power to calculate various test passwords and then compare them with the real password to be cracked, what Rainbow tables does is that each test password is already saved in a database table. Then Instead of using raw process power you simply have huge tables of already pre-calculated test passwords that you simply fetch from the table instead of generating new ones. to simply fetch already created passwords goes allot faster compared to computing new ones each time.
Bruteforce requires allot of process power while rainbow tables requires allot of HD space.

And that is the difference between brute force and rainbow tables.

"Dark Pleasure" | | I survived the Locust war of May 3, 2014
Finalmastery
Profile Blog Joined October 2011
United States58 Posts
August 10 2012 19:42 GMT
#377
Thanks for this post I had no idea that this happened I'll be changing my password right away.
" The will to win is nothing without the will to prepare" - Juma Ikaanga
windzor
Profile Joined October 2010
Denmark1013 Posts
August 10 2012 19:48 GMT
#378
On August 11 2012 03:00 rast wrote:
Show nested quote +
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.


But then again this article assumes that the hacker got the verifier database, which isn't totally clear from the blizzard statement if this is true. The statement could just be a eavesdrop of the data between the machine who has the verifier database and the login service. But anyway people should still not believe their password to be secure.
Yeah
discomatt
Profile Joined March 2012
113 Posts
Last Edited: 2012-08-10 20:08:50
August 10 2012 20:01 GMT
#379
On August 11 2012 02:34 paralleluniverse wrote:
Can someone with more knowledge on cryptography offer their thoughts on this article: http://www.opine.me/blizzards-battle-net-hack/

It basically says that the SRP protocol, which is what Blizzard uses to encrypt passwords, is very easy to crack.


It's still difficult. Unless you're using a common password found in that list of 1,000,000 the attacker wants to test, you have nothing to worry about.

Each digest must be brute-forced individually. Even 1billion computations/day doesn't come close to the number of possible alphanumeric, lowercase, 8-character passwords for a single user.

36^8 = Nearly 3-trillion possible combinations. Even if the attacker finds a match 50% through the attack, it would still cost him just under $1,500 to recover a single user's password via Amazon EC2.

As for rainbow tables, this method uses individual salts. Rainbow tables are useless.


On August 11 2012 03:00 rast wrote:
This article is true, as I said before, SRP is just a protocol which "carry" your password to Blizzard.

Imagine you want to send a message to your friend few blocks away. You tell this message to your fellow postman. The postman is very relliable, and even if someone kidnaps him, bits him, and torture him for several days, he wont tell anyone your message. When postman arrives in your friends home, he writes down this message and leaves it on his table.

The SRP is that relliable postman. What hackers stole, is the message that postman left on your friends table. They dont need to crack "postman" to read out your messaage.

Of course the password are probably salted, and it might be that salt is keept seperately from passwords. But all they need now is perform a dictionary attack or maybe use a rainbow table if there is no salt or the salt is really weak.

Also, lest not forget that hackers has access to some big botnets, whichs computing power might challange best super computers, but this is just assumption.


Pretty over-simplified here. Salts are considered public data. They aren't meant to be private, they're meant to make 2 identical passwords produce different digests. Unique salts are part of SRP, so it's pretty safe to assume they were used.

The analogy is a terrible one, and flat out wrong. The same message given to the postman is written on the paper. The postman doesn't know what the original message even was, and that's the point of SRP.

Finally, botnets aren't usually used to harness CPU power... the idea is for the zombie computer to never realize they're infected. Stealing CPU cycles isn't a good way to do this. You're much better off simply renting a cluster of high-powered floating point processors and using that.
Kvz
Profile Joined March 2010
United States463 Posts
August 10 2012 22:53 GMT
#380
in the last day my cell phone has been spammed with telemarketers (hasn't happened ever) and im getting spam emails. is this coincidence or due to this security breach?
NrG.Kvz
Prev 1 17 18 19 20 21 23 Next All
Please log in or register to reply.
Live Events Refresh
Replay Cast
23:00
WardiTV Mondays #58
CranKy Ducklings39
LiquipediaDiscussion
OSC
22:00
Masters Cup 150 Open Qual
davetesta33
Liquipedia
LAN Event
18:00
Day 3: Ursa 2v2, FFA
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
White-Ra 276
ProTech117
JuggernautJason104
StarCraft: Brood War
Shuttle 480
Artosis 320
NaDa 14
Counter-Strike
Foxcn136
Super Smash Bros
AZ_Axe123
Heroes of the Storm
Liquid`Hasu473
Other Games
tarik_tv15141
fl0m705
shahzam440
FrodaN281
ToD237
Pyrionflax179
C9.Mang0137
Mew2King74
PPMD26
Organizations
Counter-Strike
PGL159
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 19 non-featured ]
StarCraft 2
• Hupsaiya 49
• musti20045 37
• Migwel
• sooper7s
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
StarCraft: Brood War
• mYiSmile116
• Azhi_Dahaki9
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota2691
• Ler81
Other Games
• imaqtpie1465
• Scarra565
• Shiphtur155
Upcoming Events
OSC
12h 43m
LAN Event
15h 43m
Korean StarCraft League
1d 3h
CranKy Ducklings
1d 10h
LAN Event
1d 15h
IPSL
1d 18h
dxtr13 vs OldBoy
Napoleon vs Doodle
BSL 21
1d 20h
Gosudark vs Kyrie
Gypsy vs Sterling
UltrA vs Radley
Dandy vs Ptak
Replay Cast
1d 23h
Sparkling Tuna Cup
2 days
WardiTV Korean Royale
2 days
[ Show More ]
LAN Event
2 days
IPSL
2 days
JDConan vs WIZARD
WolFix vs Cross
BSL 21
2 days
spx vs rasowy
HBO vs KameZerg
Cross vs Razz
dxtr13 vs ZZZero
Replay Cast
3 days
Wardi Open
3 days
WardiTV Korean Royale
4 days
Replay Cast
5 days
Kung Fu Cup
5 days
Classic vs Solar
herO vs Cure
Reynor vs GuMiho
ByuN vs ShoWTimE
Tenacious Turtle Tussle
5 days
The PondCast
6 days
RSL Revival
6 days
Solar vs Zoun
MaxPax vs Bunny
Kung Fu Cup
6 days
WardiTV Korean Royale
6 days
Liquipedia Results

Completed

BSL 21 Points
SC4ALL: StarCraft II
Eternal Conflict S1

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
SOOP Univ League 2025
YSL S2
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025

Upcoming

BSL Season 21
SLON Tour Season 2
BSL 21 Non-Korean Championship
Acropolis #4
HSC XXVIII
RSL Offline Finals
WardiTV 2025
RSL Revival: Season 3
Stellar Fest: Constellation Cup
META Madness #9
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.