Scuf Gaming Breach Exposes 129K Gamer Accounts and Passwords
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach . The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
Overview
In June 2015, Scuf Gaming, a popular maker of custom gaming controllers, suffered a significant data breach. The incident compromised the personal information of 128,683 users. While this breach occurred several years ago, the exposed data remains a persistent threat, as stolen credentials and personal details are often traded and used in ongoing cyberattacks. This incident underscores the long-term risks of data breaches, a common theme in cybersecurity news. If you were a Scuf Gaming customer around that time, your information may be at risk.
What Was Exposed
The breach exposed a critical set of personal and technical data. The compromised information includes:
- Email Addresses & Usernames: Your primary contact identifiers and account names.
- Names: Your real name or display name associated with the account.
- IP Addresses: The numerical address of your internet connection at the time, which can reveal your approximate geographical location.
- Password Hashes: The encrypted versions of your account passwords. While hashing is a security measure, weak or outdated hashing methods can be cracked, potentially revealing the plaintext password.
Potential Impact
The combination of exposed data creates a high-risk scenario. With email addresses and usernames, attackers can launch targeted phishing campaigns, pretending to be Scuf Gaming or other services. If the password hashes are cracked, attackers gain direct access to your Scuf account. More critically, many people reuse passwords across multiple sites. A cracked password from this breach could be used to attempt logins on your email, social media, or gaming platforms like Steam or Xbox Live. The exposed IP addresses and names further aid attackers in crafting convincing, personalized scams.
Recommendations
If you had a Scuf Gaming account in 2015 or earlier, you should take these steps immediately:
- Change Your Scuf Gaming Password: If you still have an account, change the password to a new, strong, and unique one.
- Update Reused Passwords: This is the most critical step. If you used your Scuf password anywhere else-especially for your email, primary gaming accounts, or financial sites-change those passwords immediately. Never reuse passwords.
- Enable Two-Factor Authentication (2FA): Activate 2FA on your Scuf account (if available) and on any other account that supports it, particularly your email. This adds a vital second layer of security.
- Beware of Phishing: Be extremely cautious of emails referencing this old breach or your Scuf account. Do not click on links or open attachments from suspicious senders. Verify communications directly through Scuf’s official website.
- Consider a Password Manager: Using a password manager is the best way to create and store strong, unique passwords for every account you own.
How to Check If You’re Affected
The simplest way to check if your data was part of this breach is to visit Have I Been Pwned, a free service that aggregates data from breaches. Go to https://haveibeenpwned.com and enter your email address. The service will tell you if your email was found in the Scuf Gaming breach dataset, along with any other known breaches. If you receive a notification that you were affected, follow the recommendations above without delay.
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt . Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later pu...
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.