1295 clear text Minecraft accounts posted online

Powered by SC Magazine
 

Migrated accounts appear affected.

A list of 1295 usernames and clear text passwords for what appears to be Minecraft gaming accounts have been posted online.

Initial username checks suggest accounts in the list are valid and may be associated with migrated accounts.

Users migrated thier accounts to developer Mojang after the end of an extensive beta test in November last year. The immensely popular game has more than 10 million active gamers as of last month.

Potential attackers would need to know the email address of users to access their migrated accounts. That credential was not posted in the list.

The news comes on the heels of a since fixed vulnerability discovered this month which allowed attackers to log in to any migrated account.

Specifically, Joinserver.jsp accepted any session key, meaning attackers need only log into a migrated account, and use the key to access any other migrated account.

Sweden-based Mojang has been contacted for comment about the list. It remains unclear if the list of stolen credentials was linked to the recent vulnerability, or how many accounts were valid.

This story will be updated as more information comes to light. Readers are invited to comment below.

Thanks to Steve from PwnedList.com for the tip off.

Copyright © SC Magazine, Australia


1295 clear text Minecraft accounts posted online
Credit: Qintin Stone
 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Credit: Qintin Stone
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1164

Vote