Razer accidentally leaked the personal information for over 100,000 gamers, report says – The Verge

Razer accidentally exposed over 100,000 gamers’ personal information for close to a month, according to a new report.

Security researcher Volodymyr Diachenko discovered that customer data on Razer’s website was made publicly available on August 18th because of a server misconfiguration. A redacted sample pictured below shows records of orders made on the company’s digital store, exposing personal information including email and mailing addresses, the type of product ordered, and phone numbers. Credit card information was not included.

After discovering the misconfiguration online, Diachenko says he reached out to Razer several times over the span of three weeks before receiving a reply. In a statement sent to Diachenko, the gaming hardware manufacturer acknowledged the server misconfiguration and that the data leak potentially exposed personal information like full names, phone numbers, and shipping addresses for customers. Razer says that “no other sensitive data” such as payment methods were leaked and that it fixed the misconfiguration on September 9th. Razer confirmed the issue in an email to The Verge and said that customers that have any questions about the leak can reach out to DPO@razer.com.

Even though no sensitive payment information was exposed, personal information, including email addresses, can be used for phishing campaigns to obtain further information such as passwords for online accounts or payment details.

Update September 14th, 1:07PM ET: Added a statement from Razer to The Verge.

This content was originally published here.

Share This Post

More To Explore


Outlook Vulnerabilities

We wanted to take a moment to address recent news regarding vulnerabilities in Microsoft Outlook. We are aware of the issue and are taking immediate steps to ensure the safety and security of our devices and your information. Our team is currently updating all devices to address these vulnerabilities and protect against potential threats. We

Scroll to Top

This website uses cookies to ensure you get the best experience on our website.