Sega hacked, 1.3 million accounts compromised
Posted on 20 June 2011.
Sega Corporation was attacked and its database breached last week, and the fact was confirmed by the company the day after it took its SEGA Pass system offline on Thursday.

"Over the last 24 hours we have identified that unauthorised entry was gained to our SEGA Pass database," it said in the e-mail that the company sent its Sega Pass users on Friday.

"We immediately took the appropriate action to protect our consumersí data and isolate the location of the breach. We have launched an investigation into the extent of the breach of our public systems."

The breach resulted in the compromise of email addresses, dates of birth and encrypted passwords of 1.3 million users, but luckily no personal payment information was acquired by the attackers since SEGA doesn't store it and uses external payment providers.

The SEGA Pass system is still offline, but the passwords to the compromised accounts have already been reset.

The company is warning its users to be careful of potential phishing attacks mounted by using the stolen information and to change the passwords on other online services if they used the same as the one that got compromised.

LulzSec - the usual suspects when it comes to this kind of breach - have apparently denied their involvement and tweeted an offer to help Sega in "destroying" the hackers that attacked it.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Feb 9th