RuneScape Boards Breach - 222K Accounts Exposed
In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data . The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
Overview
The RuneScape Boards forum, a now-defunct community site for fans of the popular online game, suffered a significant data breach around 2011. The compromised data was later circulated online as part of a larger collection of stolen information. This breach is classified as CRITICAL due to the sensitive nature of the data exposed. While the forum is no longer operational, the leaked personal information can still be used maliciously against individuals today, making it a lasting threat to user security.
What Was Exposed
The breach exposed the personal data of approximately 222,762 forum users. The compromised information includes:
- Email Addresses: The primary contact point for accounts, which can be targeted for phishing and spam campaigns.
- Usernames & Names: These can be used for social engineering attacks or to build profiles on individuals.
- IP Addresses: These can reveal a user’s approximate geographical location and internet service provider at the time of registration.
- Passwords: While protected by a cryptographic process called “salted MD5 hashing,” this older security standard is now considered weak. With modern computing power, these hashes can potentially be cracked to reveal the original passwords.
Potential Impact
The combination of exposed data creates multiple risks. If attackers successfully reverse the password hashes, they can gain access to the affected forum account. More dangerously, many people reuse passwords across multiple websites. A cracked password from this old forum could unlock a user’s current email, social media, or even financial accounts. The exposed email addresses and usernames also increase the risk of targeted phishing emails, where attackers pose as legitimate services to steal more information. While the IP address data is less critical, it can contribute to building a more complete profile of a victim.
Recommendations
If you ever had an account on the RuneScape Boards forum, you must take immediate action to protect yourself.
- Change Your Passwords: Immediately update the password for the email address associated with the breached account. This is your most critical step.
- Stop Password Reuse: Never use the same password across different sites. If you used a similar password on other platforms (especially for gaming, email, or banking), change those passwords as well.
- Use a Password Manager: Adopt a password manager to generate and store strong, unique passwords for every account you have. This is a fundamental best practice in cybersecurity news.
- Enable 2FA: Wherever possible, enable Two-Factor Authentication (2FA) on your important accounts, starting with your email. This adds an extra layer of security beyond just a password.
- Be Vigilant for Phishing: Be skeptical of unsolicited emails, especially those asking for personal details or login credentials, even if they appear to reference RuneScape or other gaming services.
How to Check If You’re Affected
The simplest way to check if your data was part of this breach is to visit Have I Been Pwned, a free service that aggregates data from breaches. Go to https://haveibeenpwned.com and enter your email address. It will tell you if your information was found in the “RSBoards” breach dataset. If you receive a notification, follow the recommendations above immediately.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt . Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later pu...
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.