Users of Nintendo’s Club Nintendo website in Japan were warned recently that thousands of user accounts have been illegally accessed.
According to Nintendo, roughly 15.5 million logins were attempted during the past month, with nearly 24,000 leading to successful access. Access means getting access to account holders’ information, including real names, addresses, phone numbers and email information.
As a result of the attacks, Nintendo said Friday it has suspended the illegally accessed accounts and sent emails requesting users reset their passwords.
“There were scattered attempts to login since June 9, but we became aware of the issue after the mass attempt on July 2,” Nintendo spokesman Yasuhiro Minagawa told the Japan Daily Press, noting the illegal login attempts were limited to Japanese accounts.
Club Nintendo is a loyalty program for Nintendo users around the world. Through it, users can earn credits submitting codes found on Nintendo products that can be traded in for special edition items only available on Club Nintendo. The site has approximately 4 million users in Japan alone.
This is not the only hack affecting the gaming industry in recent days. Last week, SecurityWeek reported that gaming company Ubisoft was hacked and that email addresses, usernames and encrypted passwords had been accessed. Hackers broke into Ubisoft’s gaming network using a company website that was compromised via stolen credentials.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- CISA, NSA Issue Guidance for IAM Administrators
- Analysis: SEC Cybersecurity Proposals and Biden’s National Cybersecurity Strategy
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Cisco Patches High-Severity Vulnerabilities in IOS Software
- ‘Nexus’ Android Trojan Targets 450 Financial Applications
- Tackling the Challenge of Actionable Intelligence Through Context
- Dole Says Employee Information Compromised in Ransomware Attack
- Backslash Snags $8M Seed Financing for AppSec Tech
