• Hey Trainers! Be sure to check out Corsola Beach, our newest section on the forums, in partnership with our friends at Corsola Cove! At the Beach, you can discuss the competitive side of the games, post your favorite Pokemon memes, and connect with other Pokemon creators!
  • Due to the recent changes with Twitter's API, it is no longer possible for Bulbagarden forum users to login via their Twitter account. If you signed up to Bulbagarden via Twitter and do not have another way to login, please contact us here with your Twitter username so that we can get you sorted.

Important update regarding 2015 hack of Bulbagarden vBulletin forums

Joined
Dec 29, 2002
Messages
15,876
Reaction score
1,912
Pronouns
  1. He/Him
For those who might need a bit of a refresher, the original announcement was back here.

As some of you may be aware, several hundred Nintendo Network IDs were recently compromised. The compromised NNIDs alledgedly related to a 2016 hack of the Nugget Bridge forums, where people had used the same password for their NNID that they had for their forums account. We made a two tweets about this a few days ago, which you can see here and here.

Without going into too much detail, the technique used by the attacker to obtain Nugget Bridge user's passwords was to intercept login form information. You can read more about that hack on Nugget Bridge from an update they made in December of last year, but the short version is that only those who actually manually logged into the forums via a login form in the period between the attacker inserting their code and it being removed would have had their credentials stolen. This is quite similar to what was done by the person who'd targeted our forums. Up until now, while we had some suspicion that these may be linked (particularly given the same attacker had allegedly been responsible for a similar attack on Pokémon Showdown as well) we had no evidence to firmly connect the two.

Earlier today however, a threatening tweet was sent to the Bulbagarden Twitter account in reply to our tweet on the compromised accounts. This tweet, which they have since deleted, stated that "you are not better... quite obvious i had compromised your database ill soon release." As of yet, we've not seen any such release, but personally we think it's better to be safe than sorry.

If the attacker did use the same technique on us in 2015 as they did on Nugget Bridge in 2016, then what they have is your (2015) forums username(s) and your (2015) password(s). Though I haven't confirmed this, it would seem plausible they may have also been able to obtain your email if you did a lost password reset. We have no firm evidence for any actual penetration of the forums database at this point in time, however if they did then they would have that email.

If you did not reset your Bulbagarden forums password after we moved to XenForo, you should change your password immediately. If your email is with one of the providers that has caused us problems (e.g. @aol.com, @comcast.com, @verizon.net), you should make sure you set up an email with an alternative provider such as @gmail.com first, even if you're only going to use that as an email specifically for your Bulbagarden account.

If you use the same combination of username and password on any other services, particularly those relating to Pokémon or Nintendo, I would urge you to change those passwords immediately. If you have the same combination of email and password on any other services, you might still be okay, but it's never a good idea to use the same password on multiple websites and you should really change those passwords anyway.

You can use tools such as the LastPass online password generator to help you in generating strong passwords. Secure Password Managers such as KeePass (which is free and open source) are also a good way to help you manage and create large sets of strong passwords.

We'll continue to give updates in this thread if any further information comes to light.
 
Question: Will those who registered after 2015 be effected?
I don't think this is the case since technically those users didn't have a password in 2015.
 
Last edited:
  • Thread starter
  • Staff
  • #3
Question: Will those who registered after 2016 be effected?
I don't think this is the case since technically those users didn't have a password in 2015.
No. This should not impact anyone who registered after we switched to the current XenForo software.
 
If we did not do a lost password reset in/around 2015, am I right in understanding that our email IDs would be safe?
 
  • Thread starter
  • Staff
  • #5
If we did not do a lost password reset in/around 2015, am I right in understanding that our email IDs would be safe?
The MO for the other attacks that we know about only seemed to involve them capturing usernames and passwords entered into the login form. We know that's what they tried to do to us, but we can't be 100% sure they did not get access to the database.
Assuming that's all they were able to do, and that they did not get access to the database itself, then yes, your emails would be safe.
Having said that, so long as you have strong and different passwords on other services where you use the same email, the main risk from them knowing your email address would be that they could send you spam. So as long as you're practicing good password security and not re-using passwords, you should be safe.
 
Back
Top Bottom