ESEA Hack Exposes 1.5 Million Users

What happened?

On Dec. 27, 2016, a renowned gaming community on the Internet was alerted of a data breach that would affect over 1.5 million of its users. E-Sports Entertainment Association (ESEA)’s servers were hacked in a failed $100,000 ransom attack, exposing personal and gaming information. 

The company made the breach public on Dec. 30, 2016 by warning players via Twitter that user information could have been breached. Information exposed included account registration date, current city and state of residence, last login, username, first and last name, email address, date of birth, phone number, zip code and gaming ID. While passwords were not stolen in the breach, experts have expressed concern about future phishing attacks – targeting affected users – with the information that was taken.

On Jan. 7, 2017, ESEA also learned that intellectual property had been taken from the breached servers. The company has emphasized its concern for affected users and is offering them assistance from its support site. 


What should you do?

If you think you have been affected by this breach:

  • Visit ESEA’s FAQ site about this particular breach.
  • Be on the lookout for phishing emails attempting to obtain passwords and other sensitive data.
  • Avoid reusing login credentials on any website to avoid giving hackers access to other accounts with the breached data.

Continue following Fighting Identity Crimes to stay up-to-date on the latest data breaches and scams, as well as tips from our experts about protecting your personal information. 

The views and opinions expressed in this article are those of EZShield Inc. alone and do not necessarily reflect the opinions of any other person or entity, including specifically any person or entity affiliated with the distribution or display of this content.

John is Corporate Counsel and Chief Privacy Officer of Sontiq, the parent company of the EZShield and IdentityForce brands. He is a Certified Compliance...
Read more about John Burcham.

Leave a Comment.