Notification of Plutonium Forum Databreach - September 2021
-
@Mr-Android said in Notification of Plutonium Forum Databreach - September 2021:
From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scThe real question here is why did a STAFF MEMBER even have access to that information, what happens if they were to go rogue. Completely unacceptable. Not to mention you muted everyone in the discord server to try and circumvent backlash. I think it might be time for everyone to switch to a different client.
imsarahh Have at it sarah, the staff team is just relaying the info im sure he doesnt wanna be the one to listen to everyones problems
-
Hello community,
It is with deep regret that the Plutonium Staff Team need to give notice that in September 2021, data was stolen from our forum. This affected all 1.3 million registered users at the time at the date of the breach. We became aware of this breach on September 20th, 2022, after being alerted that the data is being sold on cybercrime forums.
The stolen data DOES NOT include:
- Passwords
- Server keys
- Hardware information used for Anti-Cheat ban evasion detection
- Information on any of the 2 million registered users who signed up after September 23rd, 2021
The stolen data does include:
- Usernames
- User IDs
- Email address history
- IP addresses used to access the forum
- Registration dates
- Last login dates
As such, no server keys or passwords have been reset.
Our investigation:
Upon being alerted, Plutonium Staff Administrators confirmed the legitimacy of the data in the breach and began investigating the root cause of the breach. This root cause is that a staff members' iCloud account was compromised, this iCloud account had an iPhone backup stored on it and the attacker restored this backup to a phone they controlled. This also restored the staff members' 2-Factor Authentication Secrets which allowed the attacker to generate authentic 2FA codes and thus allowed them to login to our forum as the compromised staff account.From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scraping the public information from profiles as we did not realise a staff account was being used. We put mitigations in place to stop the scraping of this information and assumed we had fixed the issue. We did not report this scraping to the community due to our belief that the scraped information was public profile information, such as usernames, registration date and last login dates.
The staff member that was compromised did not report the issue to Plutonium Staff Administrators due to the attacker attempting to access their bank accounts and other sensitive accounts and as such the idea that they may have targeted the staff members' Plutonium account did not occur to them, however they did reset their passwords and re-generate their 2 Factor Authentication secrets.
Passwords and server keys were confirmed to not have been stolen. Server keys are stored in a different database and passwords are stored in a hashed fashion that even Plutonium Forum Administrators cannot access.
What happens next:
The only thing we can do is to notify you all as soon as possible and offer our most sincere apologies for this situation. We deeply regret that it has happened and hope our community can forgive us. Our entire Staff Team take responsibility for this lapse in what is usually a very robust Security Posture.We are unable to contact all affected users as we do not have the email abilities to send over 1 million emails, but by posting this message publicly we are hoping that the news will travel to most of them.
We will also be in touch with the appropriate authorities.
All our staff are required to have 2 Factor Authentication enabled on all Plutonium accounts, this has been in place since we started our forums in 2020, however we will now be doing periodic re-generation of 2FA secrets to avoid backed up Authenticator apps from being useful if they fall into the wrong hands.
Timeline of events:
September 2021: Data is stolen using a compromised staff account and compromised iCloud iPhone backup.
September 2021: Exfiltration of data is spotted by Plutonium Staff and is mistakenly identified as public data, protections to stop the scraping is put in place.
September 20th 2022: Plutonium Staff are notified of a potential breach.
September 21st 2022: Plutonium Staff confirm breach is legit and begin investigation.
September 22nd 2022: Investigation is completed, notification of breach is sent to the community.Context of Breach:
As of September 2022, Plutonium has 3 million registered users, this breach affects 1.3 million users who registered before September 24th, 2021. From our understanding there has been 1 year from when the data was originally stolen to when it started to be publicly sold online.Once again, we would like to apologize for this isolated incident.
@Mr-Android Everyone's like "Unacceptable!" "You should be ashamed!"
Meanwhile, I don't even know what this means. -
@Mr-Android Everyone's like "Unacceptable!" "You should be ashamed!"
Meanwhile, I don't even know what this means.ChimpVEVO Private information was stolen and is being/was sold online after a Plutonium staffs iCloud was breached by a random person.
-
For everyone that thinks deleteing your account and using a different client would be the best thing to do, It isn't. The best thing to do now is: Change your password, Make a new email to keep away from spam, call your isp and ask for a ip change. The Pluto team found the attack, and that's what matters, they will learn from this mistake and are putting new security measures in place, lots of other clients would not even try to add new security measures let alone let you know what happened. It took alot for them to even notify the community but it was the right thing to do.
-
glad i could at least alert you guys - take it under your wing and learn from it!
-
So does that mean we're finally having an offline option ? (I mean lan-only with no internet and so no account required)
-
So does that mean we're finally having an offline option ? (I mean lan-only with no internet and so no account required)
leobipbop that has been an option for a long time. Just have to add -lan to your launch options when launching from the bootstrapper, instead of the launcher, for both the client and server.
-
well this kinda sucks
-
leobipbop that has been an option for a long time. Just have to add -lan to your launch options when launching from the bootstrapper, instead of the launcher, for both the client and server.
INSANEMODE Did you try it without internet at all
?
-
Hello community,
It is with deep regret that the Plutonium Staff Team need to give notice that in September 2021, data was stolen from our forum. This affected all 1.3 million registered users at the time at the date of the breach. We became aware of this breach on September 20th, 2022, after being alerted that the data is being sold on cybercrime forums.
The stolen data DOES NOT include:
- Passwords
- Server keys
- Hardware information used for Anti-Cheat ban evasion detection
- Information on any of the 2 million registered users who signed up after September 23rd, 2021
The stolen data does include:
- Usernames
- User IDs
- Email address history
- IP addresses used to access the forum
- Registration dates
- Last login dates
As such, no server keys or passwords have been reset.
Our investigation:
Upon being alerted, Plutonium Staff Administrators confirmed the legitimacy of the data in the breach and began investigating the root cause of the breach. This root cause is that a staff members' iCloud account was compromised, this iCloud account had an iPhone backup stored on it and the attacker restored this backup to a phone they controlled. This also restored the staff members' 2-Factor Authentication Secrets which allowed the attacker to generate authentic 2FA codes and thus allowed them to login to our forum as the compromised staff account.From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scraping the public information from profiles as we did not realise a staff account was being used. We put mitigations in place to stop the scraping of this information and assumed we had fixed the issue. We did not report this scraping to the community due to our belief that the scraped information was public profile information, such as usernames, registration date and last login dates.
The staff member that was compromised did not report the issue to Plutonium Staff Administrators due to the attacker attempting to access their bank accounts and other sensitive accounts and as such the idea that they may have targeted the staff members' Plutonium account did not occur to them, however they did reset their passwords and re-generate their 2 Factor Authentication secrets.
Passwords and server keys were confirmed to not have been stolen. Server keys are stored in a different database and passwords are stored in a hashed fashion that even Plutonium Forum Administrators cannot access.
What happens next:
The only thing we can do is to notify you all as soon as possible and offer our most sincere apologies for this situation. We deeply regret that it has happened and hope our community can forgive us. Our entire Staff Team take responsibility for this lapse in what is usually a very robust Security Posture.We are unable to contact all affected users as we do not have the email abilities to send over 1 million emails, but by posting this message publicly we are hoping that the news will travel to most of them.
We will also be in touch with the appropriate authorities.
All our staff are required to have 2 Factor Authentication enabled on all Plutonium accounts, this has been in place since we started our forums in 2020, however we will now be doing periodic re-generation of 2FA secrets to avoid backed up Authenticator apps from being useful if they fall into the wrong hands.
Timeline of events:
September 2021: Data is stolen using a compromised staff account and compromised iCloud iPhone backup.
September 2021: Exfiltration of data is spotted by Plutonium Staff and is mistakenly identified as public data, protections to stop the scraping is put in place.
September 20th 2022: Plutonium Staff are notified of a potential breach.
September 21st 2022: Plutonium Staff confirm breach is legit and begin investigation.
September 22nd 2022: Investigation is completed, notification of breach is sent to the community.Context of Breach:
As of September 2022, Plutonium has 3 million registered users, this breach affects 1.3 million users who registered before September 24th, 2021. From our understanding there has been 1 year from when the data was originally stolen to when it started to be publicly sold online.Once again, we would like to apologize for this isolated incident.
This post is deleted! -
damn people are actually upset about this
your IP address being known by someone that doesnt know you is completely harmless.
your email already gets spammed.
STOP CRYING
-
Hello community,
It is with deep regret that the Plutonium Staff Team need to give notice that in September 2021, data was stolen from our forum. This affected all 1.3 million registered users at the time at the date of the breach. We became aware of this breach on September 20th, 2022, after being alerted that the data is being sold on cybercrime forums.
The stolen data DOES NOT include:
- Passwords
- Server keys
- Hardware information used for Anti-Cheat ban evasion detection
- Information on any of the 2 million registered users who signed up after September 23rd, 2021
The stolen data does include:
- Usernames
- User IDs
- Email address history
- IP addresses used to access the forum
- Registration dates
- Last login dates
As such, no server keys or passwords have been reset.
Our investigation:
Upon being alerted, Plutonium Staff Administrators confirmed the legitimacy of the data in the breach and began investigating the root cause of the breach. This root cause is that a staff members' iCloud account was compromised, this iCloud account had an iPhone backup stored on it and the attacker restored this backup to a phone they controlled. This also restored the staff members' 2-Factor Authentication Secrets which allowed the attacker to generate authentic 2FA codes and thus allowed them to login to our forum as the compromised staff account.From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scraping the public information from profiles as we did not realise a staff account was being used. We put mitigations in place to stop the scraping of this information and assumed we had fixed the issue. We did not report this scraping to the community due to our belief that the scraped information was public profile information, such as usernames, registration date and last login dates.
The staff member that was compromised did not report the issue to Plutonium Staff Administrators due to the attacker attempting to access their bank accounts and other sensitive accounts and as such the idea that they may have targeted the staff members' Plutonium account did not occur to them, however they did reset their passwords and re-generate their 2 Factor Authentication secrets.
Passwords and server keys were confirmed to not have been stolen. Server keys are stored in a different database and passwords are stored in a hashed fashion that even Plutonium Forum Administrators cannot access.
What happens next:
The only thing we can do is to notify you all as soon as possible and offer our most sincere apologies for this situation. We deeply regret that it has happened and hope our community can forgive us. Our entire Staff Team take responsibility for this lapse in what is usually a very robust Security Posture.We are unable to contact all affected users as we do not have the email abilities to send over 1 million emails, but by posting this message publicly we are hoping that the news will travel to most of them.
We will also be in touch with the appropriate authorities.
All our staff are required to have 2 Factor Authentication enabled on all Plutonium accounts, this has been in place since we started our forums in 2020, however we will now be doing periodic re-generation of 2FA secrets to avoid backed up Authenticator apps from being useful if they fall into the wrong hands.
Timeline of events:
September 2021: Data is stolen using a compromised staff account and compromised iCloud iPhone backup.
September 2021: Exfiltration of data is spotted by Plutonium Staff and is mistakenly identified as public data, protections to stop the scraping is put in place.
September 20th 2022: Plutonium Staff are notified of a potential breach.
September 21st 2022: Plutonium Staff confirm breach is legit and begin investigation.
September 22nd 2022: Investigation is completed, notification of breach is sent to the community.Context of Breach:
As of September 2022, Plutonium has 3 million registered users, this breach affects 1.3 million users who registered before September 24th, 2021. From our understanding there has been 1 year from when the data was originally stolen to when it started to be publicly sold online.Once again, we would like to apologize for this isolated incident.
@Mr-Android I have a dynamic IP so I'm guessing I'm fine, and I'm hoping you'll remove all this sensitive information from the hands of everyone at the plutonium staff, really don't know why they would even have access to this.
-
damn people are actually upset about this
your IP address being known by someone that doesnt know you is completely harmless.
your email already gets spammed.
STOP CRYING
chasef7 People just want a reason to get mad over everything, especially in gaming. I'm sure in a few days everyone will forget about this and things will be back to normal.
-
Hello community,
It is with deep regret that the Plutonium Staff Team need to give notice that in September 2021, data was stolen from our forum. This affected all 1.3 million registered users at the time at the date of the breach. We became aware of this breach on September 20th, 2022, after being alerted that the data is being sold on cybercrime forums.
The stolen data DOES NOT include:
- Passwords
- Server keys
- Hardware information used for Anti-Cheat ban evasion detection
- Information on any of the 2 million registered users who signed up after September 23rd, 2021
The stolen data does include:
- Usernames
- User IDs
- Email address history
- IP addresses used to access the forum
- Registration dates
- Last login dates
As such, no server keys or passwords have been reset.
Our investigation:
Upon being alerted, Plutonium Staff Administrators confirmed the legitimacy of the data in the breach and began investigating the root cause of the breach. This root cause is that a staff members' iCloud account was compromised, this iCloud account had an iPhone backup stored on it and the attacker restored this backup to a phone they controlled. This also restored the staff members' 2-Factor Authentication Secrets which allowed the attacker to generate authentic 2FA codes and thus allowed them to login to our forum as the compromised staff account.From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scraping the public information from profiles as we did not realise a staff account was being used. We put mitigations in place to stop the scraping of this information and assumed we had fixed the issue. We did not report this scraping to the community due to our belief that the scraped information was public profile information, such as usernames, registration date and last login dates.
The staff member that was compromised did not report the issue to Plutonium Staff Administrators due to the attacker attempting to access their bank accounts and other sensitive accounts and as such the idea that they may have targeted the staff members' Plutonium account did not occur to them, however they did reset their passwords and re-generate their 2 Factor Authentication secrets.
Passwords and server keys were confirmed to not have been stolen. Server keys are stored in a different database and passwords are stored in a hashed fashion that even Plutonium Forum Administrators cannot access.
What happens next:
The only thing we can do is to notify you all as soon as possible and offer our most sincere apologies for this situation. We deeply regret that it has happened and hope our community can forgive us. Our entire Staff Team take responsibility for this lapse in what is usually a very robust Security Posture.We are unable to contact all affected users as we do not have the email abilities to send over 1 million emails, but by posting this message publicly we are hoping that the news will travel to most of them.
We will also be in touch with the appropriate authorities.
All our staff are required to have 2 Factor Authentication enabled on all Plutonium accounts, this has been in place since we started our forums in 2020, however we will now be doing periodic re-generation of 2FA secrets to avoid backed up Authenticator apps from being useful if they fall into the wrong hands.
Timeline of events:
September 2021: Data is stolen using a compromised staff account and compromised iCloud iPhone backup.
September 2021: Exfiltration of data is spotted by Plutonium Staff and is mistakenly identified as public data, protections to stop the scraping is put in place.
September 20th 2022: Plutonium Staff are notified of a potential breach.
September 21st 2022: Plutonium Staff confirm breach is legit and begin investigation.
September 22nd 2022: Investigation is completed, notification of breach is sent to the community.Context of Breach:
As of September 2022, Plutonium has 3 million registered users, this breach affects 1.3 million users who registered before September 24th, 2021. From our understanding there has been 1 year from when the data was originally stolen to when it started to be publicly sold online.Once again, we would like to apologize for this isolated incident.
inb4 I start receiving mass spam emails
-
chasef7 People just want a reason to get mad over everything, especially in gaming. I'm sure in a few days everyone will forget about this and things will be back to normal.
IHateBlackOps4 you donβt know how true this comment is.
-
Hello community,
It is with deep regret that the Plutonium Staff Team need to give notice that in September 2021, data was stolen from our forum. This affected all 1.3 million registered users at the time at the date of the breach. We became aware of this breach on September 20th, 2022, after being alerted that the data is being sold on cybercrime forums.
The stolen data DOES NOT include:
- Passwords
- Server keys
- Hardware information used for Anti-Cheat ban evasion detection
- Information on any of the 2 million registered users who signed up after September 23rd, 2021
The stolen data does include:
- Usernames
- User IDs
- Email address history
- IP addresses used to access the forum
- Registration dates
- Last login dates
As such, no server keys or passwords have been reset.
Our investigation:
Upon being alerted, Plutonium Staff Administrators confirmed the legitimacy of the data in the breach and began investigating the root cause of the breach. This root cause is that a staff members' iCloud account was compromised, this iCloud account had an iPhone backup stored on it and the attacker restored this backup to a phone they controlled. This also restored the staff members' 2-Factor Authentication Secrets which allowed the attacker to generate authentic 2FA codes and thus allowed them to login to our forum as the compromised staff account.From here the attacker used our forum's API to scrape all registered users' profile data, and due to having access to a staff account, this data included IP address and Email Address history. Hence the stolen data includes more than the public facing profile information.
During the attack in 2021 the Plutonium Staff team did detect the exfiltration of the data, however we mistakenly believed this to be somebody scraping the public information from profiles as we did not realise a staff account was being used. We put mitigations in place to stop the scraping of this information and assumed we had fixed the issue. We did not report this scraping to the community due to our belief that the scraped information was public profile information, such as usernames, registration date and last login dates.
The staff member that was compromised did not report the issue to Plutonium Staff Administrators due to the attacker attempting to access their bank accounts and other sensitive accounts and as such the idea that they may have targeted the staff members' Plutonium account did not occur to them, however they did reset their passwords and re-generate their 2 Factor Authentication secrets.
Passwords and server keys were confirmed to not have been stolen. Server keys are stored in a different database and passwords are stored in a hashed fashion that even Plutonium Forum Administrators cannot access.
What happens next:
The only thing we can do is to notify you all as soon as possible and offer our most sincere apologies for this situation. We deeply regret that it has happened and hope our community can forgive us. Our entire Staff Team take responsibility for this lapse in what is usually a very robust Security Posture.We are unable to contact all affected users as we do not have the email abilities to send over 1 million emails, but by posting this message publicly we are hoping that the news will travel to most of them.
We will also be in touch with the appropriate authorities.
All our staff are required to have 2 Factor Authentication enabled on all Plutonium accounts, this has been in place since we started our forums in 2020, however we will now be doing periodic re-generation of 2FA secrets to avoid backed up Authenticator apps from being useful if they fall into the wrong hands.
Timeline of events:
September 2021: Data is stolen using a compromised staff account and compromised iCloud iPhone backup.
September 2021: Exfiltration of data is spotted by Plutonium Staff and is mistakenly identified as public data, protections to stop the scraping is put in place.
September 20th 2022: Plutonium Staff are notified of a potential breach.
September 21st 2022: Plutonium Staff confirm breach is legit and begin investigation.
September 22nd 2022: Investigation is completed, notification of breach is sent to the community.Context of Breach:
As of September 2022, Plutonium has 3 million registered users, this breach affects 1.3 million users who registered before September 24th, 2021. From our understanding there has been 1 year from when the data was originally stolen to when it started to be publicly sold online.Once again, we would like to apologize for this isolated incident.
yall needa chill lmao
-
So you guys aren't even gonna give us instructions on how to negate the effects of the attackers having ONE AND A HALF MILLION IP ADDRESSES??
They can just sell where I live whenever they want and you guys aren't gonna post even like an option that we can do to help ourselves.if anyone would like to know where you live anyways lol
-
For everyone that thinks deleteing your account and using a different client would be the best thing to do, It isn't. The best thing to do now is: Change your password, Make a new email to keep away from spam, call your isp and ask for a ip change. The Pluto team found the attack, and that's what matters, they will learn from this mistake and are putting new security measures in place, lots of other clients would not even try to add new security measures let alone let you know what happened. It took alot for them to even notify the community but it was the right thing to do.
Soliderror I wish I could say they learn, but they don't learn and they have proven it before. It's the reason I have left, and why many others have left plutonium as well. There is a wild lack of care to make a community or listen to it, and that is why the Discord server is left mostly dead. There is still a playerbase, but at this point, likely on a last limb after this information. They even locked down the discord server, simply because they didn't want backlash from a problem of their own making.
-
Soliderror I wish I could say they learn, but they don't learn and they have proven it before. It's the reason I have left, and why many others have left plutonium as well. There is a wild lack of care to make a community or listen to it, and that is why the Discord server is left mostly dead. There is still a playerbase, but at this point, likely on a last limb after this information. They even locked down the discord server, simply because they didn't want backlash from a problem of their own making.
Lightshadow368 what haven't they learned from exactly?
-
The fact it took YOU AND YOUR TEAM a year to realise such events is f*cking embarrassing. So they have MY information and over 1 MILLION IP ADDRESSES? Embarrassing on your side honestly. Just so you know, i will be deleting my account and will no longer use Plutonium.