Divine Skins Breach Exposes Over 105K User Accounts
In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach . The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email ...
Overview
In March 2026, the popular League of Legends custom skins service, Divine Skins, experienced a significant data breach. The company disclosed that an unauthorized third party gained access to part of its systems. The attacker deleted all custom skins from the database and stole user information. The breach was announced to the community via the service’s Discord server. This incident highlights the risks associated with third-party gaming services and the importance of digital security for all online accounts. For more on emerging digital threats, you can follow general cybersecurity news.
What Was Exposed
The compromised data includes several key pieces of personal information for 105,814 user accounts. Specifically, the breach exposed:
- Email Addresses: The primary contact email associated with your Divine Skins account.
- Usernames: Your chosen display name on the service.
- Names: Potentially your real name if provided during account creation or purchase.
- Purchase History: A record of transactions made through the service.
While financial details like credit card numbers were reportedly not stored by Divine Skins, the exposed data creates a significant privacy risk.
Potential Impact
The severity of this breach is considered MEDIUM. Although passwords and financial data were not leaked, the combination of exposed information can be leveraged for targeted attacks. The primary risks include:
- Phishing and Spam: With your email address and name, attackers can craft convincing phishing emails pretending to be from Divine Skins or other trusted services, attempting to steal more sensitive information like passwords.
- Credential Stuffing: If you reused your Divine Skins password on other websites, attackers could use your exposed email/username to attempt unauthorized access to those other accounts.
- Targeted Scams: Knowledge of your purchase history could be used to create highly personalized scams related to gaming or League of Legends.
Recommendations
If you have ever used the Divine Skins service, you should take the following steps to protect yourself:
- Change Your Passwords Immediately: If you used a password for Divine Skins that is used on any other website (like email, gaming platforms, or social media), change those passwords now. Use a strong, unique password for every account.
- Enable Two-Factor Authentication (2FA): Activate 2FA on any important accounts, especially your email and gaming platforms (like Riot Games). This adds a critical layer of security.
- Beware of Phishing Attempts: Be extremely cautious of any emails claiming to be from Divine Skins or related to your gaming purchases. Do not click on links or download attachments from suspicious messages. Verify communications directly through official channels.
- Monitor Your Accounts: Keep an eye on your email and other online accounts for any unusual activity.
How to Check If You’re Affected
This breach has been reported to the breach notification service Have I Been Pwned. You can easily check if your email address was involved in this or other known data breaches.
- Visit https://haveibeenpwned.com/
- Enter your primary email address into the search bar.
- Review the results to see if the “DivineSkins” breach is listed for your account.
If your information was exposed, it is crucial to follow the recommendations above to secure your online presence.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the NSFW AI girlfriend platform My Lovely AI suffered a data breach that exposed over 100k users . The data included user-created prompts and links to the resulting AI-generated images, along with a small number of Discord and X usernames.
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum . The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to...
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the c...
In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did ...