On Wednesday, a post from an anonymous user on website 4Chan was made using a 125 gigabyte torrent link containing Twitch’s source code. The post claimed it was intended to: “Foster more disruption and competition in the online video streaming space” because Twitch’s “community is a disgusting toxic cesspool”.
According to marketing firm N.Rich, Google searches relating to the search term ‘how to delete Twitch’ rose eightfold as news of the hack boke.
In a statement via the company’s official Twitter account, Twitch said: “Our teams are working with urgency to understand the extent of this. We will update the community as soon as additional information is available.”
Despite fears it is possible to only disable accounts, gaming news site DualShockers has revealed a way to delete them permanently.
How to permanently delete your Twitch account
On your PC’s browser, head to www.twitch.tv and sign into your account.
Next, paste the following link into your browser: https://www.twitch.tv/user/delete-account
Click the button ‘delete account’, and you’re good to go.
If you do not want to delete your account, it is recommended you change your passwords and turn on two factor authentication. It is also suggested users refrain from creating accounts elsewhere on the internet using their Twitch details at the time of the breach.
The breach is believed to include not only the site’s source code, but also details of several years worth of pay outs to the Amazon-owned platform’s creators.
The original 4Chan post said it included: “Creator pay outs from 2019 until now. Find out how much your favourite streamer is really making!”
“Jeff Bezos paid $970 million for this, we’re giving it away FOR FREE. #DoBetterTwitch.”
Twitch was acquired by Amazon in 2014.
Speaking to the Guardian, Archie Agarwal, founder and CEO of New Jersey cybersecurity firm ThreatModeler said such a hack would “send a shudder down any hardened infosec professional”.
“This is as bad as it could possibly be.
“How on earth did someone exfiltrate 125GB of the most sensitive data imaginable without tripping a single alarm?”