RuneScape Boards Breach - 222K Accounts Exposed
In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data . The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
Overview
In 2011, the now-defunct RuneScape Boards (RSBoards) forum suffered a data breach that exposed over 222,000 user accounts. The vBulletin-based platform, popular among RuneScape fans for community discussions, was compromised, leading to the theft of email addresses, passwords, usernames, names, and IP addresses. The stolen data was later redistributed as part of a larger compiled breach corpus. Affected users can verify their exposure on Have I Been Pwned.
What Was Exposed
The breach leaked multiple categories of sensitive data:
- Email Addresses - 222,762 unique accounts
- Passwords - stored as salted MD5 hashes (a notoriously weak hashing algorithm that is easily cracked with modern hardware)
- Usernames - directly tied to individual RuneScape identities
- Names - potentially full real names
- IP Addresses - used to identify user locations at the time of registration
The combination of email addresses and easily crackable password hashes makes this breach especially dangerous for affected users.
Account Takeover Risks
The primary threat from this breach is account takeover. MD5 hashing with salt provides some protection, but MD5 is considered broken due to high-speed cracking tools like Hashcat. Attackers can crack these hashes and use the resulting credentials to access accounts on other platforms. Since many users reuse passwords across services, this breach acts as a stepping stone to compromise email, social media, and even financial accounts. Affected users should immediately change passwords on RuneScape Boards and any other accounts that share the same password.
Identity Theft Risks
Exposed IP addresses and real names compound the risk. With IP addresses, attackers can approximate geographic location, while names help build a more complete profile for identity theft. Despite the age of the breach, the data could be used in targeted phishing campaigns, as seen in other breaches from the same era. For instance, similar cybersecurity news incidents involving forum leaks have demonstrated that old data is often combined with new leaks to create convincing impersonations.
What to Do Right Now
- Check if you’re affected: Visit Have I Been Pwned and search your email address.
- Change passwords: If you used the same password on RuneScape Boards and other sites, change those passwords immediately. Use unique, complex passwords for each service.
- Enable two-factor authentication (2FA): Add 2FA to all accounts that support it, especially email and financial services.
- Watch for phishing: Be suspicious of unsolicited messages referencing RuneScape or forum activity. Attackers often use breach data to craft believable phishing attempts.
- Check for password reuse: Use a password manager to audit your accounts and identify reused passwords.
How to Check If You’re Affected
The easiest way to check is via Have I Been Pwned. Enter the email address you used on RuneScape Boards. If it appears in the breach, follow the remediation steps above. Note that because the breach occurred in 2011, users who have since changed their email may need to check old addresses. No direct verification tool exists for RuneScape Boards as the forum is now defunct.
Security Insight
This breach illustrates a recurring issue in the gaming industry: forums using outdated, insecure authentication practices. The use of salted MD5 in 2011 was already considered weak, yet it persisted. This incident also serves as a stark reminder that breaches do not expire - data from 2011 remains for sale and circulation today, making it a long-term threat to affected users. The lack of any forced password reset or disclosure at the time of the breach compounds the risk, as many users likely remained unaware for over a decade.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach . The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
In December 2025, the dating website 'for a Europid vision' WhiteDate suffered a data breach that was subsequently leaked online , initially exposing 6.1k unique email addresses. The leaked data included extensive personal information such as physical appearance, income, education and IQ. A more com...
In July 2016, the Web Hosting Talk forum suffered a data breach that was subsequently listed for sale . The breach of the vBulletin based forum exposed 515k user records including usernames, email addresses, IP addresses and salted MD5 password hashes.
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...