GOG.com
Donate to Codex
Putting the 'role' back in role-playing games since 2002.
Donate to Codex
Good Old Games

Blizzard hacked: Emails, security questions and answers and encrypted Diablo 3 passwords accessed

Click here and disable ads!

Blizzard hacked: Emails, security questions and answers and encrypted Diablo 3 passwords accessed

Game News - posted by DarkUnderlord on Fri 10 August 2012, 06:45:06

Tags: Blizzard; Diablo III; Mike Morhaime

Remember all that great security for Diablo 3 and how it was people being careless with passwords that resulted in their accounts being hacked? Well, in a completely unexpected development today, Blizzard announced:

Players and Friends,

Even when you are in the business of fun, not every week ends up being fun. This week, our security team found an unauthorized and illegal access into our internal network here at Blizzard. We quickly took steps to close off this access and began working with law enforcement and security experts to investigate what happened.​

Translation: They've had access to our network for months now, which our internal team suspected, but we realised we couldn't hold off announcing it any longer.

At this time, we’ve found no evidence that financial information such as credit cards, billing addresses, or real names were compromised. Our investigation is ongoing, but so far nothing suggests that these pieces of information have been accessed.​

Translation: Blizzard's financial transaction and account system was actually built by someone else with a team of professionals who knew what they were doing, as opposed to our internal collection of monkeys who couldn't peel a banana even if they had a Troy McClure instruction video.

Some data was illegally accessed, including a list of email addresses for global Battle.net users, outside of China. For players on North American servers (which generally includes players from North America, Latin America, Australia, New Zealand, and Southeast Asia) the answer to the personal security question, and information relating to Mobile and Dial-In Authenticators were also accessed. Based on what we currently know, this information alone is NOT enough for anyone to gain access to Battle.net accounts.​

Translation: Oh yes it is - but we know they took more anyway...

We also know that cryptographically scrambled versions of Battle.net passwords (not actual passwords) for players on North American servers were taken. We use Secure Remote Password protocol (SRP) to protect these passwords, which is designed to make it extremely difficult to extract the actual password, and also means that each password would have to be deciphered individually. As a precaution, however, we recommend that players on North American servers change their password. Please click this link to change your password. Moreover, if you have used the same or similar passwords for other purposes, you may want to consider changing those passwords as well.

In the coming days, we'll be prompting players on North American servers to change their secret questions and answers through an automated process. Additionally, we'll prompt mobile authenticator users to update their authenticator software.​

Translation: There's a flaw in the current authenticator which we've known about for a while now but we're not admitting that yet.

As a reminder, phishing emails will ask you for password or login information. Blizzard Entertainment emails will never ask for your password. We deeply regret the inconvenience to all of you and understand you may have questions. Please find additional information here.

We take the security of your personal information very seriously, and we are truly sorry that this has happened.
Sincerely,
Mike Morhaime​

Translation: Sorry we got caught and couldn't hold off fudging it any longer.

Thanks Metro!

There are 63 comments on Blizzard hacked: Emails, security questions and answers and encrypted Diablo 3 passwords accessed

Site hosted by Sorcerer's Place Link us!
Codex definition, a book manuscript.
eXTReMe Tracker
rpgcodex.net RSS Feed
This page was created in 0.087766885757446 seconds