The Botting Network Breach: 96K Accounts — Passwords Exposed
In August 2012, the forum for making money with botting 'The Botting Network' suffered a data breach that exposed 96k user records . The now defunct vBulletin forum leaked 96k email addresses, usernames, dates of birth and salted MD5 password hashes.
Overview
In August 2012, the now-defunct forum ‘The Botting Network’ suffered a data breach that exposed 96,320 user records. The forum, a community focused on making money through automated botting methods, stored user data in a vulnerable vBulletin installation. The breach leaked email addresses, usernames, dates of birth, and salted MD5 password hashes. While the breach occurred over a decade ago, the data remains in circulation among threat actors and has been catalogued in the Have I Been Pwned database.
What Was Exposed
The exposed data includes four distinct categories, each carrying specific risks:
- Email Addresses: Used for account recovery and phishing attacks. Combined with usernames, they allow targeted social engineering campaigns.
- Passwords (salted MD5 hashes): While salted hashes are harder to crack than plaintext passwords, MD5 is a weak algorithm. Modern GPU-based cracking can break many MD5 hashes within hours or days, especially common passwords.
- Usernames: Linked to other online accounts if reused. This is particularly dangerous for forums or services where the same username is used across multiple platforms.
- Dates of Birth: A key piece of personally identifiable information (PII). Combined with names and emails, DOBs enable identity theft and account recovery attacks on financial and government services.
How the Breach Happened
The breach stemmed from the vBulletin forum software running on The Botting Network’s server. vBulletin, a popular forum platform at the time, had known vulnerabilities that attackers exploited. The attacker gained access to the forum’s database, which contained user records stored with salted MD5 password hashes. The exact attack vector is unconfirmed, but vBulletin breaches from that era commonly involved SQL injection or exploitation of unpatched vulnerabilities. The forum has since gone defunct, making it impossible for the original administrators to issue account resets or notifications.
Account Takeover Risks
The combination of email addresses and password hashes creates significant account takeover risks. If you used the same password on The Botting Network as you do on other sites, attackers who crack the MD5 hashes can attempt credential stuffing attacks. They will try the email and cracked password combination across popular services like email providers, social media, and financial platforms. Even if your password was complex, the breached DOB and username make targeted recovery attacks easier - attackers can use this data to answer security questions on other accounts.
How to Check If You’re Affected
The easiest way to check is through Have I Been Pwned. Visit haveibeenpwned.com and enter the email address you used on The Botting Network. The breach is listed as “TheBottingNetwork” in the site’s database. If your email appears, assume all associated data - email, username, password hash, and DOB - is publicly available. Since the forum is defunct, there is no way to verify account status through the original website.
What to Do Right Now
- Change passwords on any other accounts where you reused the same password. Prioritize email, banking, and social media accounts. Use a password manager to generate unique, complex passwords for each site.
- Enable two-factor authentication (2FA) on all critical accounts. This adds a second layer of protection even if your password is compromised.
- Check for suspicious activity. Review email forwarding rules, login locations, and account recovery options on your primary email account. Attackers may use exposed DOBs to attempt account recovery.
- Monitor for phishing attempts. Given the exposed email and username, expect targeted phishing emails referencing The Botting Network or botting communities. Do not click links or download attachments from unknown senders.
- Consider freezing your credit reports if your DOB is linked to financial accounts. This prevents fraudulent account openings using your PII.
Security Insight
This breach highlights a persistent problem in online communities: forum software often stores user data with weak, outdated hashing algorithms. In 2012, MD5 was already considered cryptographically broken, yet it remained in widespread use. The fallout here is amplified by the forum’s defunct status - victims have no official channel for notification or password resets. For users, this underscores the danger of reusing passwords across multiple platforms, especially on niche forums where security practices may lag behind mainstream services.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum . The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt...
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed . The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach . The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data . The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.