The hackers have access to Twitch and has disclosed a wide amount of business data, including the owner code, creators payments and the full of twitch.tv. “Twitch confirmed the violation in a Tweet Wednesday morning, but did not provide further details.
In addition to the Twitch.TV code, the attackers reported flying customers from mobile telephony, office and site console. It has also accessed “SDK owners and AWS internal services used by Twitch”, other properties such as IGDB and Curseforge, a competitor of Amazon Game Studios Steam (Named Vapor) and Twitch SOC Internal Team Tools. It also shows creative payments from 2019 so far, including the best banners like Nickmercs, Timthetatman and XQC.
Although we did not check the assertion that “the full” twitch source code has been disclosed, the 126 GB repository files appear to be authentic and the payment figures of nearly 2.4 million streamers seem to be present. Computer hackers said the leak, which includes the source code of nearly 6,000 internal Githubin referentials, is also simply “the first part” of a larger version.
It does not appear that information such as user passwords, addresses and banking information has been revealed, but this can not be excluded in a future drop. If you have a Twitch account, you need to enable two-factor authentication so that bad actors can not connect to your account if your password has been stolen.
The group also stated that the Twitch community is a “disgusting cesspool”, so the action can be linked to recent hate raids that prompted bubbles to take a day of protest leave. Twitch previously said that he was trying to stop the problem of hate raid, but it was not a “simple solution”.
It is not yet clear, however, the way the attackers could have flown such a quantity, especially for Twitch to belong to Amazon, which operates one of the world’s largest web hosting companies.