This site may earn affiliate commissions from the links on this page. Terms of utilise.

On Christmas Day, Steam users woke to a bewildering series of problems. Users reported seeing wish lists, game libraries, and personal account information that wasn't their ain. Electronic mail addresses, fractional credit carte du jour numbers, and telephone numbers were all shared, with no caption of why or how. Steam has published an update on what happened, and explained the bizarre beliefs.

First, Valve wants to reassure users that while an estimated 34,000 people found themselves with someone else's business relationship, none of the details that leaked were plenty to allow someone to either steal an account or to consummate transactions with the available credit card information. The concern hither would be that addresses or other forms of personally identifiable information (PII) could be harvested from Steam and then matched against other databases of stolen personal data. Hacking groups have proven adept at finding and exploiting such opportunities.

SteamWinter

Steam Winter Auction + DDoS? Bad idea.

Imagine that you lot apply 3 different services, all of which are hacked. Hack #1 exposed your username and an encrypted form of password that can be cracked with sufficient effort. Hack #2 leaks your billing accost, while Hack #three leaked credit card information and a proper name associated with the account. Individually, all three are annoying. Combine them, and an attacker can do serious impairment. Given that we've seen big corporations wait weeks or months before disclosing the extent of a data breach, information technology'south possible for your personal data to be compromised long before you're aware to even look for a trouble.

So what went wrong?

Hither's Valve caption in its own words:

"Early Christmas morn (Pacific Standard Fourth dimension), the Steam Store was the target of a DoS assail which prevented the serving of store pages to users. Attacks against the Steam Shop, and Steam in general, are a regular occurrence that Valve handles both directly and with the help of partner companies, and typically do non bear on Steam users. During the Christmas attack, traffic to the Steam store increased 2000% over the average traffic during the Steam Sale.

"In response to this specific attack, caching rules managed by a Steam web caching partner were deployed in order to both minimize the impact on Steam Store servers and continue to road legitimate user traffic. During the second wave of this attack, a second caching configuration was deployed that incorrectly cached web traffic for authenticated users. This configuration fault resulted in some users seeing Steam Store responses which were generated for other users. Incorrect Store responses varied from users seeing the front page of the Store displayed in the wrong language, to seeing the account page of some other user."

Once Valve realized it was nether assault, it shut the Steam Store downward and manually configured a new caching configuration, tested it, and purged all of the previous data before bringing Steam back online. The company has promised to achieve out to everyone afflicted by the problem and to continue investigating to ensure no critical information was leaked.