Steam Data Breach May Involve 89 Million Users Through Vendor-Level Attack

Steam Data Breach May Involve 89 Million Users Through Vendor-Level Attack


A major data breach has reportedly affected Steam, the popular gaming platform owned by Valve. A hacker using the alias Machine1337 has posted on a dark web forum, claiming to possess a database containing over 89 million user records. The hacker is allegedly selling the dataset for $5,000.

The dark web post includes a Telegram contact for negotiations and a publicly available sample of the data hosted on Gofile. According to cybersecurity sources, the sample appears to reference internal vendor data, suggesting a breach beyond just platform scraping.

New information now indicates the breach may have occurred through an upstream vendor. A leaked sample of the data includes two-factor authentication (2FA) SMS logs sent through Twilio, a U.S.-based third-party communications platform. These logs contain the content of SMS messages, delivery status, routing costs, and metadata, hinting at unauthorized access to Twilio’s internal systems, possibly through its API or dashboard.

This points to a supply chain attack rather than a direct breach of Steam’s own infrastructure. Such attacks are especially dangerous because they expose multiple systems and user data through a single vulnerable point.

If confirmed, the breach could have serious consequences for Steam’s global user base. Steam accounts often hold not just game libraries, but also personal and financial information, making them valuable targets for cybercriminals.

Experts warn of possible outcomes, including:

• Phishing campaigns using leaked personal data.

• Account takeovers, especially for high-value accounts.

• Credential stuffing attacks using reused passwords.

Cybersecurity professionals are still investigating the incident, and Valve has not yet issued an official statement.

In the meantime, all Steam users are strongly advised to take immediate action:

• Enable two-factor authentication (2FA) if not already active.

• Change account passwords and avoid using the same password across multiple platforms.

• Stay alert for suspicious emails, texts, or login attempts.

The situation is developing, and further updates are expected as the investigation continues.


Previous Post Next Post

Contact Form