Hacked: Hacking Finance

Valve Reveals the Reason behind Steam Mishap on Christmas: A DDoS Attack

Introduction

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.


LATEST POSTS

Alleged FBI Hacker Lauri Love Ordered to US Extradition by UK Home Secretary 15th November, 2016

The Largest Breach of 2016: 412 Million FriendFinder Accounts Exposed 14th November, 2016

Cybersecurity

Valve Reveals the Reason behind Steam Mishap on Christmas: A DDoS Attack

Posted on .

Valve has revealed that its Steam store was struck with a DDoS (Distributed Denial of Service) attack on Christmas, an attack which eventually resulted in the reason behind the exposure of thousands of users’ account data among the gaming community.

// -- Discuss and ask questions in our community on Workplace. Don't have an account? Send Jonas Borchgrevink an email -- //

The most popular PC gaming store of them all ran into trouble recently, on Christmas of all days. Steam users were able to see other users’ account data including phone numbers, email addresses, purchase histories and even partial credit card details. Confusion predictably reigned in for about nearly 90 minutes, between 2:50 PM and 4:20 PM on Christmas Day. The glitch affected 34 thousand users’ personal information which may have been seen by other users.

In a public post, Valve has revealed that the Steam Store was the target of a DDoS attack early Christmas morning. While such attacks are a regular occurrence, this particular attack saw traffic increase by 2000% compared to the average traffic during the Christmas Steam sale, a time when gamers look for bargains.

Also read: Valve Reveals the Reason behind Steam Mishap on Christmas: A DDoS Attack

This particular attack saw caching rules deployed by Steam’s web caching partner, a means to mitigate the DDoS attack and continue operations by allowing legitimate traffic to flow through to the website. However, the second wave of the DDoS attack saw a second caching configuration deployed that resulted in authenticated users having access to view cached web traffic. It was this configuration error that was the culprit, triggered due to the DDoS attack.

“Incorrect Store responses varied from users seeing the front page of the Store displayed in the wrong language, to seeing the account page of another user,” Steam revealed.

A new caching configuration was quickly deployed soon after the error was identified, following a complete shut-down of the Steam store.

Valve also noted that it is currently in the process of identifying every affected user. Upon completion of the task, the company notes that it will contact every user. Despite the faux paus, Valve insists that there is no risk of identity theft or fraud in noting that no unauthorized actions took place. Furthermore, Valve claimed “no additional action is required by users.”

Featured image from Shutterstock.

Important: Never invest money you can't afford to lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here.



Feedback or Requests?

DON'T MISS OUT

Samburaj Das

Samburaj Das

Samburaj is the contributing editor at Hacked and keeps tabs on science, technology and cyber security.

There are no comments.

View Comments (0) ...
Navigation
Editor's Update: There is allegedly evidence of malware on a…