Nintendo Reports 160,000 Accounts Breached in April

Nintendo Reports 160,000 Accounts Breached in April 2020

On April 24th, 2020 Nintendo Co., Ltd announced an unauthorized data breach of their online network, Nintendo Network ID (NNID).  This service is predominantly used by Nintendo 3DS and Wii U console owners.  

Approximately 160,000 accounts were impacted causing unauthorized access to personal information including email addresses, data of birth, country and Nicknames.  Although credit card numbers were not exposures, some users on social networks have reported unusual account access:

Twitter: @DreamBoum
Twitter: @pixelpar

In an effort to minimize future breaches, Nintendo has notified affected users and has forced a password reset.  It does not appear that users with 2-Factor Authentication (2FA) were impacted. 

In a statement posted on their website, Nintendo apologizes for the event and addresses future action plans:

“We sincerely apologize for any inconvenience caused and concern to our customers and related parties. In the future, we will make further efforts to strengthen security and ensure safety so that similar events do not occur.”

As of this writing, no word on how the breach occurred.  Below are some tips, we strongly recommend to reduce your impact for future breaches:

Change Your Password

First and foremost, change your password whether or not you were impacted by the breach.  Although the company stated that they identified the impacted accounts, it is always important to side on the error of caution.

Passwords should be at least 8 characters long, with at least 1 numeric, 1 uppercase letter, 1 lowercase letter and a symbol.  Refrain from using common phrases like p@$$wOrd.

Important Note:  If you have other accounts with the same username or email address using the same password such as a bank, social media, PayPal, Venmo or email accounts, change those passwords as well. 

There is a reasonable chance that your information will be on the dark web for sale, allowing other attempts on different platforms.

Enable 2-Factor Authentication (2FA)

This may seem like a hassle but speaking from experience, this is a life saver.  2FA allows an extra layer of security when or if your password is compromised.  When your password is used, the system will prompt for a security code sent to either your mobile device or email address.  

Typically you will have 30 to 60 seconds to enter in the code to access your account.  You can also set up notifications if this layer of security has failed which will give you a good indicator of compromise or heads up that you may be a victim of a data breach.

To learn more about 2FA, here is a link to Google Authenticator video by Dottotech.

Reduce Your Attack Surface

Having your profile connected to a variety of 3rd party social sites and tools likes Twitter, Instagram and Paypal is typically great until it isn’t.

Data Breach and Attack Surfaces

Once your account has been compromised, it is possible that an unauthorized user can utilized those services inappropriately including sending malicious tweets, switch private profiles to public, make virtual transactions and more. These are the unintended consequences of a data breach.

Consider deactivating services within your profile that you do not actively utilize. This will reduce the amount of exposure you have to other services in the event an account is a contributing party to a data breach.

As stated in the prior section, it is good practice to have those platforms utilize 2FA as well. Like the great Bruce Dickinson once said, “[you] gotta have more cowbells. So explore the space” when it comes to adding security while using online platforms.

It is 2020 and we all can do a better job at keeping ourselves more secure. Take care and stay safe.


To support this blog, this post may contain affiliate links. Please read our Privacy Policy for more information.

Drawing on over two decades of experience in the Information Technology industry, I have acquired a diverse range of roles that have shaped my distinctive outlook. Through this journey, I have developed into an accomplished authority in risk management, catering to Fortune 500 companies and small businesses on a global scale. Over the past 12 years, my primary focus has centered on empowering small business owners and insurance professionals to comprehend the ramifications of cyber incidents and effectively mitigate the risks associated with potential data breaches. My passion for cybersecurity has inspired me to create the Sage Knows IT blog. Through this platform, I aim to help small business owners and aspiring IT professionals understand the roadmap of the IT industry based on my experiences. Information Technology and Information Security are crucial for our future, and I hope my blog will motivate those who are interested in joining this ever-evolving field.

Related Posts

Delete Me Not: How One API Call Could Wipe Accounts Clean

Bug bounty programs continue to prove their value by helping organizations uncover security flaws that would otherwise slip through the cracks. For those of us in cybersecurity,…

Automate Your Cover Letter with ChatGPT and Google Docs: A Step-by-Step Guide

Applying to multiple jobs can make writing cover letters feel repetitive and time-consuming. This tutorial introduces a free tool that automates the process using ChatGPT and Google Docs. With just a few simple steps, you can generate personalized cover letters tailored to each position, saving valuable time and effort. Whether you’re applying for internships or full-time roles, this tool streamlines your job application workflow.

Title Image: AI Security Realities: Rethinking PII as the Sole Indicator

AI Security Realities: Rethinking PII as the Sole Risk Indicator

During a client meeting, I addressed misconceptions about cybersecurity, especially the notion that absence of PII equates to no risk. I discussed how cyber threats extend beyond data theft to include system vulnerabilities that could disrupt operations and impact users, citing the SolarWinds and New York Times attacks as examples. I explained that comprehensive assessments are crucial for understanding broader cybersecurity risks, not just those involving PII. Additionally, I highlighted the importance of protecting AI models from poisoning, underscoring the need for robust security measures in AI development.

10 Ways to Improve Your Math Skills for Cybersecurity

10 Ways to Improve Your Math Skills for Cybersecurity

As highlighted in our earlier discussion, The Intersection of Math and Cybersecurity, a solid grasp of mathematics is indispensable within the realm of cybersecurity. The specific demands…

The Intersection of Math and Cybersecurity - Does Cybersecurity Require Math?

The Intersection of Math and Cybersecurity

During my weekend exploration of a renowned Q&A platform, I unexpectedly encountered a question that left me intrigued. I couldn’t help but wonder if the original poster (OP) was playfully jesting or sincerely seeking knowledge. This curious moment brought forth a reminiscent smile as I recalled the age-old adage we all encountered during our early school years: “Math is fundamental to all endeavors.” However, an interesting twist emerged: Does this axiom extend its influence into the intricate realm of Cybersecurity?

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20