46 million Animal Jam accounts leaked after comms software breach

Billing data, email addresses, user names, and encrypted passwords all leaked to the dark web

Tenth anniversary image of Animal Jam

The company behind the popular kids game Animal Jam has revealed that 46 million user accounts have been leaked online after an access key for a server was lifted from one of its Slack channels.

WildWorks, the parent company of Animal Jam, said it was made aware of the breach by alert database HaveIBeenPwned, which said user data had been shared on the dark web site Raidforums.

Animal Jam, which was first released in 2010, is a game aimed at kids aged between seven and 11-years old. It's marketed to parents as a free, safe, and educational virtual space where children can design animal avatars, learn about nature, and engage with others.

In a statement, Animal Jam said the hack resulted in the loss of approximately 46 million account records, which included billing data and email addresses for parental accounts, user names, encrypted passwords, and details for birthdays and player genders. The company stressed that no payment details had been accessed and that no real names had been leaked.

WildWorks added that hackers had managed to access the server of a vendor it uses for intra-company communication, without naming that third-party. Slack has since confirmed to IT Pro that it was the vendor in question, but stressed this was an isolated incident and that Slack's own infrastructure was not affected. It also said that password reuse was one likely cause of the breach.

"We believe our vendor's server was compromised sometime between Oct. 10 and 12," the company said. "It was not apparent at the time that a database of account names was accessed as a result of the break-in, and all relevant systems were altered and secured against further intrusion."

WildWorks said it was first made aware of the breach on 11 November and is now working with the FBI and international enforcement agencies.

Account holders have been forced to change their passwords as a precaution, although the company insists the leaked passwords were encrypted.

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
Best free malware removal tools 2021
Security

Best free malware removal tools 2021

5 May 2021
Acuant acquires identity verification provider Hello Soda
mergers and acquisitions

Acuant acquires identity verification provider Hello Soda

4 May 2021

Most Popular

Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021