The dark web post includes a Telegram contact for negotiations and a publicly available sample of the data hosted on Gofile. According to cybersecurity sources, the sample appears to reference internal vendor data, suggesting a breach beyond just platform scraping.
New information now indicates the breach may have occurred through an upstream vendor. A leaked sample of the data includes two-factor authentication (2FA) SMS logs sent through Twilio, a U.S.-based third-party communications platform. These logs contain the content of SMS messages, delivery status, routing costs, and metadata, hinting at unauthorized access to Twilio’s internal systems, possibly through its API or dashboard.
This points to a supply chain attack rather than a direct breach of Steam’s own infrastructure. Such attacks are especially dangerous because they expose multiple systems and user data through a single vulnerable point.
If confirmed, the breach could have serious consequences for Steam’s global user base. Steam accounts often hold not just game libraries, but also personal and financial information, making them valuable targets for cybercriminals.
Experts warn of possible outcomes, including:
• Phishing campaigns using leaked personal data.
• Account takeovers, especially for high-value accounts.
• Credential stuffing attacks using reused passwords.
Cybersecurity professionals are still investigating the incident, and Valve has not yet issued an official statement.
In the meantime, all Steam users are strongly advised to take immediate action:
• Enable two-factor authentication (2FA) if not already active.
• Change account passwords and avoid using the same password across multiple platforms.
• Stay alert for suspicious emails, texts, or login attempts.
The situation is developing, and further updates are expected as the investigation continues.
Tags:
Cybercrime in World