• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 19:52
CET 01:52
KST 09:52
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
HomeStory Cup 28 - Info & Preview0Rongyi Cup S3 - Preview & Info3herO wins SC2 All-Star Invitational14SC2 All-Star Invitational: Tournament Preview5RSL Revival - 2025 Season Finals Preview8
Community News
Weekly Cups (Jan 19-25): Bunny, Trigger, MaxPax win3Weekly Cups (Jan 12-18): herO, MaxPax, Solar win0BSL Season 2025 - Full Overview and Conclusion8Weekly Cups (Jan 5-11): Clem wins big offline, Trigger upsets4$21,000 Rongyi Cup Season 3 announced (Jan 22-Feb 7)38
StarCraft 2
General
HomeStory Cup 28 - Info & Preview StarCraft 2 not at the Esports World Cup 2026 Weekly Cups (Jan 19-25): Bunny, Trigger, MaxPax win Oliveira Would Have Returned If EWC Continued herO wins SC2 All-Star Invitational
Tourneys
HomeStory Cup 28 $21,000 Rongyi Cup Season 3 announced (Jan 22-Feb 7) OSC Season 13 World Championship $70 Prize Pool Ladder Legends Academy Weekly Open! SC2 All-Star Invitational: Jan 17-18
Strategy
Simple Questions Simple Answers
Custom Maps
[A] Starcraft Sound Mod
External Content
Mutation # 510 Safety Violation Mutation # 509 Doomsday Report Mutation # 508 Violent Night Mutation # 507 Well Trained
Brood War
General
Bleak Future After Failed ProGaming Career Potential ASL qualifier breakthroughs? BW General Discussion BGH Auto Balance -> http://bghmmr.eu/ [ASL21] Potential Map Candidates
Tourneys
[Megathread] Daily Proleagues Small VOD Thread 2.0 Azhi's Colosseum - Season 2 [BSL21] Non-Korean Championship - Starts Jan 10
Strategy
Simple Questions, Simple Answers Zealot bombing is no longer popular? Current Meta Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Battle Aces/David Kim RTS Megathread Path of Exile Nintendo Switch Thread Mobile Legends: Bang Bang Beyond All Reason
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Vanilla Mini Mafia Mafia Game Mode Feedback/Ideas
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread YouTube Thread Canadian Politics Mega-thread European Politico-economics QA Mega-thread
Fan Clubs
The herO Fan Club! The IdrA Fan Club
Media & Entertainment
Anime Discussion Thread [Manga] One Piece
Sports
2024 - 2026 Football Thread
World Cup 2022
Tech Support
Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List
Blogs
How Esports Advertising Shap…
TrAiDoS
My 2025 Magic: The Gathering…
DARKING
Life Update and thoughts.
FuDDx
How do archons sleep?
8882
James Bond movies ranking - pa…
Topin
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2056 users

Blizzard Security Breach

Forum Index > SC2 General
442 CommentsPost a Reply
1 2 3 4 5 21 22 23 Next All
juicyjames *
Profile Joined August 2011
United States3815 Posts
Last Edited: 2012-08-09 22:45:34
August 09 2012 22:34 GMT
#1
http://us.blizzard.com/en-us/securityupdate.html

Players and Friends,

Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.

At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.

Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.

We also know that cryptographically scrambled versions of Battle.net passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.

In the coming days, we'll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we'll prompt mobile authenticator users to update their authenticator software. As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.

We take the security of your personal information very seriously, and we are truly sorry that this has happened.

Sincerely,
Mike Morhaime

+ Show Spoiler [FAQs] +
Is there anything that players need to do right now to protect themselves?
While there is currently no evidence that any of the password or player data has been misused, we encourage our North American players to change their passwords. Click here to login and change your password.

In the coming days we will implement an automated process for all users to change their secret questions and answers, as a precautionary measure. We'll also prompt mobile authenticator users to update their authenticator software.

Additionally, while Blizzard has no indication that any of your information was shared with any other unauthorized parties or that there has been any unauthorized use of your data, we urge all members of our community to closely monitor all of their online accounts.

Players should also be wary of fraudulent emails (phishing). Unfortunately, because email addresses were exposed, it is entirely possible that this could result in an increased, targeted phishing campaign being sent to our users. Check this page for tips on how to spot and avoid these types of fraudulent emails.

What data was affected?
Here's a summary of the data that we know was illegally accessed:

North American-based accounts, including players from Latin America, Australia, New Zealand, and Southeast Asia
  • Email addresses
  • Answers to secret security questions
  • Cryptographically scrambled versions of passwords (not actual passwords)
  • Information associated with the Mobile Authenticator
  • Information associated with the Dial-in Authenticator
  • Information associated with Phone Lock, a security system associated with Taiwan accounts only
Accounts from all global regions outside of China (including Europe and Russia)
  • Email addresses
China-based accounts
  • Unaffected
At this time, there’s no evidence that financial information of any kind has been accessed. This includes credit cards, billing addresses, names, or other payment information.

What information related to Mobile and Dial-In Authenticators was exposed? What about Phone Lock?
With regard to Dial-In Authenticators, hashed (not actual) phone numbers were accessed. This is phone data from the relatively small number of people who opted into the program.

With regard to Mobile Authenticators, information was taken that could potentially compromise the integrity of North American Mobile Authenticators. We have no evidence that other regions were affected. We are working quickly to provide software updates to users. Back to top

Additionally we believe the integrity of the physical authenticators remains intact.

The information relating to Phone Lock represents a small number of hashed (not actual) phone numbers from Taiwanese players who opted into this service and had a North American Battle.net account.

Was the physical authenticator compromised?
We believe the integrity of the physical authenticators remains intact.

How did this happen?
Like all companies doing business online, it is not an uncommon occurrence to experience outside parties trying to illegitimately gain access to the operation’s structure at some level. We are continually upgrading our security technologies, policies, protocols and procedures to protect our customers and our games against the threats that increasingly arise in today’s online world.

When did Blizzard learn of the unauthorized access?
The trespass into our internal network was detected by us on August 4, 2012.

Why did Blizzard announce this on August 9?
We worked around the clock since we discovered the unauthorized user to determine the nature of the trespass and understand what data was accessed. Our first priority was to re-secure our network, and from there we worked simultaneously on the investigation and on informing our global player base. We wanted to strike a balance between speed and accuracy in our reporting and worked diligently to serve both equally important needs.

What action has Blizzard taken?
Upon learning of the unauthorized access, we worked quickly to re-secure our network. Afterward, we immediately notified law enforcement as well as security experts and launched an ongoing investigation to determine what had occurred. We also took steps to notify players, which happened in a matter of days from the time we discovered the illegal access.

Was any personal or financial information accessed?
At this time, there is no evidence that financial information was affected or accessed. There's also no evidence that personal information such as real names or billing addresses were accessed.

What can you tell us about the scrambled passwords that were accessed?
Cryptographically scrambled versions of passwords for North American players were accessed, protected by Secure Remote Password (SRP) protocol. This information alone doesn't give unauthorized users the actual passwords -- each password would need to be deciphered individually. The added layer of protection from SRP makes that process computationally very difficult and expensive.

Why not immediately invalidate the secret questions and answers that were compromised?
This was a difficult decision to make but in the end we believe that keeping the secret questions and answers in place still provides a layer of security against unauthorized users who don't have access to the compromised data. In the meantime, we are working quickly to create a mechanism for players to change the secret question and answer on their account. Our customer service staff will also know to use additional measures to verify player identities and not rely solely on secret question and answer.

Why not immediately revoke the mobile authenticators?
Similar to the decision surrounding secret question and answer, we still believe that keeping mobile authenticators active provides a layer of security against unauthorized users who don't have access to the compromised data. In fact, the mobile authenticator information by itself won't grant access to a Battle.net account -- that still requires the actual password as well. We are working quickly to deploy new mobile authenticator software and will notify players to update as soon as it's available.

Are you taking additional security measures as a result of this occurrence?
We are continually upgrading our security technologies, policies, protocols and procedures to help protect our customers and our games, and will continue to monitor the situation closely.

Teams have also been working around the clock in an ongoing investigation with law enforcement and security experts, to gain a more detailed understanding of what happened. As we conclude the investigation there will be lessons learned that can help strengthen our security going forward.
Facebook Twitter Reddit
This Week in SC2Find out what happened 'This Week in Starcraft 2': http://www.teamliquid.net/forum/viewmessage.php?topic_id=278126
Probe1
Profile Blog Joined August 2010
United States17920 Posts
August 09 2012 22:38 GMT
#2
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")
우정호 KT_VIOLET 1988 - 2012 While we are postponing, life speeds by
Pinski
Profile Joined September 2010
United States126 Posts
August 09 2012 22:39 GMT
#3
I wondered why I was getting these random spam SMS from Blizzard about my account a week or so ago.
GabrielB
Profile Joined February 2003
Brazil594 Posts
August 09 2012 22:39 GMT
#4
Thanks for the heads up... Should be in the community spotlight.
Scurvy
Profile Joined March 2012
United States117 Posts
August 09 2012 22:40 GMT
#5
Not good
With it or on it.
Plexa
Profile Blog Joined October 2005
Aotearoa39261 Posts
August 09 2012 22:42 GMT
#6
Oh dear.
Administrator~ Spirit will set you free ~
mataxp
Profile Blog Joined October 2011
Chile538 Posts
Last Edited: 2012-08-09 22:43:21
August 09 2012 22:42 GMT
#7
As a PSN user, dejá vu
Liquid.Hero Startale.Bomber MVP.Dongraegu
Brett
Profile Blog Joined October 2002
Australia3822 Posts
August 09 2012 22:43 GMT
#8
Thanks for posting this!
Hokay
Profile Joined May 2007
United States738 Posts
August 09 2012 22:43 GMT
#9
Noooo not my secret questions! A lot of sites ask the same secret security questions :X
zakmaa
Profile Blog Joined November 2010
Canada525 Posts
August 09 2012 22:44 GMT
#10
Damn. Well, at least Blizzard has a lot of resources at hand to make the issue go away as fast as possible. Glad they're being transparent (or are they?) about it
nooboon
Profile Blog Joined July 2011
2602 Posts
August 09 2012 22:44 GMT
#11
On August 10 2012 07:39 GabrielB wrote:
Thanks for the heads up... Should be in the community spotlight.


This. Even if nothing happens it is much better to be safe then sorry.
Mrvoodoochild1
Profile Joined June 2011
United States1439 Posts
August 09 2012 22:45 GMT
#12
Hackers who steal and sell personal info are the biggest pieces of shit on the internet.
"let your freak flag fly"
-niL
Profile Joined January 2012
Canada1131 Posts
August 09 2012 22:45 GMT
#13
Luckily for me, my accounts are ones that I bought from my friends
Fluffboll
Profile Joined May 2011
Sweden516 Posts
August 09 2012 22:45 GMT
#14
Things like this will happen, there are exxtraordinary good hacker groups out there and no security will ever protect completly against them.

Just make some safety changes to your accounts (like changing pw, Secret Q&A etc.) and all will most likely be fine.
No reason to panic or bitch/whine about it.
You need to construct additional pylons.
Spec
Profile Blog Joined July 2009
Taiwan931 Posts
August 09 2012 22:45 GMT
#15
Thank God I don't have my credit card number on my account. I'm just not gonna change my password again, I ran out of ideas.
Eye for an eye make the world go blind - Gandhi
PresenceSc2
Profile Joined February 2011
Australia4032 Posts
August 09 2012 22:45 GMT
#16
I guess the same guy that made BattleNet also does Blizzards security

BA DOM TSSSSS
Stephano//HerO//TaeJa//Squirtle//Bomber
Dodgin
Profile Blog Joined July 2011
Canada39254 Posts
August 09 2012 22:45 GMT
#17
Well I use a physical authenticator so I should be okay, might as well change my password just to be safe.
AzBozz
Profile Joined April 2011
Germany518 Posts
August 09 2012 22:46 GMT
#18
im glad i live in Europe
MMA | MVP|Teaja|Polt|MKP|Byun|Maru|Thorzain|Creator|HasuObs|Socke|Lucifron|Vortix|Mana|Heromarine / PRIME and Mousesports fighting!!
MstrJinbo
Profile Joined March 2011
United States1251 Posts
August 09 2012 22:46 GMT
#19
On August 10 2012 07:42 mataxp wrote:
As a PSN user, dejá vu


Doesn't sound as bad as the PSN breach. Just Emails and hashed passwords being compromised. That being said I'm still changing my password.
Xiphos
Profile Blog Joined July 2009
Canada7507 Posts
August 09 2012 22:47 GMT
#20
On August 10 2012 07:39 GabrielB wrote:
Thanks for the heads up... Should be in the community spotlight.


Thx for the heads up indeed. And I do concur with the second half of that quote.

2014 - ᕙ( •̀ل͜•́) ϡ Raise your bows brood warriors! ᕙ( •̀ل͜•́) ϡ
1 2 3 4 5 21 22 23 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 11h 8m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
ProTech129
RuFF_SC2 118
CosmosSc2 104
UpATreeSC 67
NeuroSwarm 45
StarCraft: Brood War
Artosis 670
Shuttle 153
Terrorterran 6
League of Legends
C9.Mang0348
Counter-Strike
taco 583
Super Smash Bros
AZ_Axe131
Other Games
tarik_tv5831
ViBE101
Livibee61
Mew2King45
KnowMe42
minikerr17
Organizations
Other Games
BasetradeTV36
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 17 non-featured ]
StarCraft 2
• Hupsaiya 102
• Berry_CruncH78
• davetesta38
• musti20045 30
• Kozan
• Migwel
• AfreecaTV YouTube
• sooper7s
• intothetv
• IndyKCrew
• LaughNgamezSOOP
StarCraft: Brood War
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
League of Legends
• Doublelift5260
• imaqtpie2122
• Scarra1177
Upcoming Events
HomeStory Cup
11h 8m
Korean StarCraft League
1d 2h
HomeStory Cup
1d 11h
Replay Cast
1d 23h
HomeStory Cup
2 days
Replay Cast
2 days
Replay Cast
3 days
Wardi Open
4 days
WardiTV Invitational
5 days
The PondCast
6 days
[ Show More ]
WardiTV Invitational
6 days
Liquipedia Results

Completed

Proleague 2026-01-29
OSC Championship Season 13
Underdog Cup #3

Ongoing

CSL 2025 WINTER (S19)
KCM Race Survival 2026 Season 1
Acropolis #4 - TS4
Escore Tournament S1: W6
Rongyi Cup S3
HSC XXVIII
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
eXTREMESLAND 2025
SL Budapest Major 2025
ESL Impact League Season 8
BLAST Rivals Fall 2025

Upcoming

Escore Tournament S1: W7
Acropolis #4
IPSL Spring 2026
uThermal 2v2 2026 Main Event
Bellum Gens Elite Stara Zagora 2026
LiuLi Cup: 2025 Grand Finals
Nations Cup 2026
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League Season 23
ESL Pro League Season 23
PGL Cluj-Napoca 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.