Critical

SongTrivia2 Breach Exposes 291K User Passwords

In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...

Overview

The music trivia platform SongTrivia2 suffered a significant data breach in April 2026. The stolen user data was later published on a public hacking forum, making the personal information of hundreds of thousands of users available to cybercriminals. This incident highlights a critical failure in protecting user data.

What Was Exposed

The breach exposed data from 291,739 user accounts. The compromised information varies based on how the account was created but includes several sensitive data types.

  • Email Addresses: All affected users had their email addresses exposed.
  • Passwords: For accounts created directly on SongTrivia2 (not via Google login), bcrypt-hashed passwords were leaked. While bcrypt is a strong hashing algorithm, determined attackers can still attempt to crack these hashes.
  • Usernames and Names: User-chosen usernames and real names were included in the data set.
  • Avatars: User profile pictures were also taken.

Potential Impact

The exposure of this data combination creates multiple risks. The primary danger is account takeover, where attackers use the email and cracked password to access your SongTrivia2 account or any other account where you reused the same password. With your email and name, criminals can launch sophisticated phishing campaigns, crafting emails that appear more legitimate to trick you into revealing more information. This breach can also lead to increased spam and targeted scams.

Recommendations

If you have ever had a SongTrivia2 account, you must take immediate action.

  1. Change Your SongTrivia2 Password: Log in to the platform and change your password to a new, strong, and unique one. If you used the same password elsewhere, change it on those sites too.
  2. Enable Two-Factor Authentication (2FA): If SongTrivia2 offers 2FA, enable it immediately. This adds a critical layer of security beyond your password.
  3. Beware of Phishing: Be extremely cautious of emails claiming to be from SongTrivia2 or other services asking you to verify your account, update payment details, or click on links. Verify the sender’s address and do not click on suspicious links.
  4. Use a Password Manager: To avoid password reuse, consider using a reputable password manager to generate and store strong, unique passwords for every online account.

How to Check If You’re Affected

The breach has been reported to the free service Have I Been Pwned. You can visit https://haveibeenpwned.com and enter your email address to see if it was included in the SongTrivia2 breach or any other known data leaks. You can also view the specific breach entry at https://haveibeenpwned.com/Breach/SongTrivia2.

Security Insight

The exposure of bcrypt hashes, while not as severe as plain text passwords, indicates a system compromise where the user database was accessed. For platforms handling user credentials, this underscores the necessity of segmenting databases and implementing robust intrusion detection. Unlike breaches where only emails are leaked, the inclusion of passwords-even hashed-immediately escalates the risk to user security across the internet, a common theme in recent cybersecurity news.

Further Reading

Investigate Breaches Safely with NordVPN

Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.

Get NordVPN for Research

Affiliate link — we may earn a commission at no extra cost to you.

Share:

Never miss a data breach report

Get real-time security alerts delivered to your preferred platform.

Related Breach Reports

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.