SongTrivia2 Breach Exposes 291K User Passwords
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
Overview
The music trivia platform SongTrivia2 suffered a significant data breach in April 2026. The stolen user data was later published on a public hacking forum, making the personal information of hundreds of thousands of users available to cybercriminals. This incident highlights a critical failure in protecting user data.
What Was Exposed
The breach exposed data from 291,739 user accounts. The compromised information varies based on how the account was created but includes several sensitive data types.
- Email Addresses: All affected users had their email addresses exposed.
- Passwords: For accounts created directly on SongTrivia2 (not via Google login), bcrypt-hashed passwords were leaked. While bcrypt is a strong hashing algorithm, determined attackers can still attempt to crack these hashes.
- Usernames and Names: User-chosen usernames and real names were included in the data set.
- Avatars: User profile pictures were also taken.
Potential Impact
The exposure of this data combination creates multiple risks. The primary danger is account takeover, where attackers use the email and cracked password to access your SongTrivia2 account or any other account where you reused the same password. With your email and name, criminals can launch sophisticated phishing campaigns, crafting emails that appear more legitimate to trick you into revealing more information. This breach can also lead to increased spam and targeted scams.
Recommendations
If you have ever had a SongTrivia2 account, you must take immediate action.
- Change Your SongTrivia2 Password: Log in to the platform and change your password to a new, strong, and unique one. If you used the same password elsewhere, change it on those sites too.
- Enable Two-Factor Authentication (2FA): If SongTrivia2 offers 2FA, enable it immediately. This adds a critical layer of security beyond your password.
- Beware of Phishing: Be extremely cautious of emails claiming to be from SongTrivia2 or other services asking you to verify your account, update payment details, or click on links. Verify the sender’s address and do not click on suspicious links.
- Use a Password Manager: To avoid password reuse, consider using a reputable password manager to generate and store strong, unique passwords for every online account.
How to Check If You’re Affected
The breach has been reported to the free service Have I Been Pwned. You can visit https://haveibeenpwned.com and enter your email address to see if it was included in the SongTrivia2 breach or any other known data leaks. You can also view the specific breach entry at https://haveibeenpwned.com/Breach/SongTrivia2.
Security Insight
The exposure of bcrypt hashes, while not as severe as plain text passwords, indicates a system compromise where the user database was accessed. For platforms handling user credentials, this underscores the necessity of segmenting databases and implementing robust intrusion detection. Unlike breaches where only emails are leaked, the inclusion of passwords-even hashed-immediately escalates the risk to user security across the internet, a common theme in recent cybersecurity news.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt . Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later pu...
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach . The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders contai...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach . The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.