Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
macOS Malware Spread via Google Ads & Claude.ai Leverages Legitimate
May 11, 2026
Google reCAPTCHA Update Blocks Privacy-Focused Android
May 11, 2026
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
Home/CyberSecurity News/NationStates Game Site Offline After Major Databreach
CyberSecurity News

NationStates Game Site Offline After Major Databreach

A long-running online nation simulation game is now temporarily offline. The shutdown follows a security breach that compromised its central production server. The team estimates the downtime will...

Sarah simpson
Sarah simpson
February 2, 2026 2 Min Read
4 0

A long-running online nation simulation game is now temporarily offline. The shutdown follows a security breach that compromised its central production server.

The team estimates the downtime will last 2 to 5 days as they rebuild core infrastructure and audit the codebase for additional issues.

According to an official disclosure posted on 30 January 2026 at 2:15 am UTC, the incident began around 10 pm UTC on 27 January 2026, when a player reported a critical vulnerability in the site’s application code.

While testing the flaw, the player gained access to NationStates’ primary production server and began copying application code and user data to a personal system.

The Attacker and Authorization Issues

The player is a long-time community member with a track record of responsibly reporting bugs and vulnerabilities since 2021, and previously earned a Bug Hunter badge for those contributions.

However, in this case, they exceeded authorized testing boundaries and moved from responsible disclosure into unauthorized access.

Although the player claims to have deleted all copied data after realizing the extent of the breach, NationStates states it has no way to verify this and is treating both the system and the data as fully compromised.

Exposed data includes email addresses (including historical addresses tied to the account), MD5-hashed passwords, IP addresses used for logins, and browser User-Agent strings.

NationStates emphasized that it does not collect real names, physical addresses, phone numbers, or payment card data.

While the attacker did not gain direct server access to the Telegram system, they did exploit access to it. They attempted to copy part of its data, leading the team to assume some message content may have been exposed.

The root cause was traced to a new Dispatch Search feature introduced on 2 September 2025.

The vulnerability combined insufficient sanitization of user-supplied parameters with a double-parsing bug, ultimately enabling remote code execution (RCE) on the server.

In response, NationStates is notifying users and relevant regulators, rebuilding on new hardware, auditing its software for similar flaws, and hardening template parsing code.

Accelerating a long-planned upgrade from MD5 to a modern password hashing algorithm. All national passwords are being treated as compromised.

Users who reused their NationStates password on other services are urged to change those credentials immediately and plan to reset their NationStates password once the site reopens.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

21,000+ OpenClaw AI Instances With Personal Configurations Exposed

Next Post

Hackers Exploit Microsoft Office 0-day Exploiting Vulnerability

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
10 Best Full Disk Encryption Tools in 2026
May 11, 2026
ODINI Malware Breaches Air-Gapped Exploits Magnetic
May 11, 2026
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us