• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
Gameranx

Gameranx

Video Game News, Lists & Guides

  • News
  • Features
  • Platforms
    • Xbox Series X
    • PS5
    • Nintendo
  • Videos
  • Upcoming Games
  • Guides

Steam’s Christmas Day Denial of Service Attack Affected 34,000

December 30, 2015 by Stephen Daly

Valve finally talks about what happened and apologizes.

Valve has issued a statement regarding the denial of service attack that affected Steam on Christmas Day, which it says exposed the personal information of around 34,000 users. 

Valve has apologized to those who've had their information divulged and those affected by the downtime. The client owner explaind that it is still in the process of determining exactly who was affected and will contact them once that process is finished.

The problem began last Friday, December 25th, when Steam users discovered that the network was not working properly, with other player's account information showing up in the client's store and settings. This issue persisted for about an hour before Valve shut down Steam and resolved the issue. 

As a result of multiple DoS attacks, Valve accidentally created a caching malfunction that exposed the personal information of some users.

Some problems have continued to persist as a result and Valve has been silent on the issue until now.

In a statement issued to Kotaku, the company commented: 

We’d like to follow up with more information regarding Steam’s troubled Christmas.

What happened

On December 25th, a configuration error resulted in some users seeing Steam Store pages generated for other users. Between 11:50 PST and 13:20 PST store page requests for about 34k users, which contained sensitive personal information, may have been returned and seen by other users.

The content of these requests varied by page, but some pages included a Steam user’s billing address, the last four digits of their Steam Guard phone number, their purchase history, the last two digits of their credit card number, and/or their email address. These cached requests did not include full credit card numbers, user passwords, or enough data to allow logging in as or completing a transaction as another user.

If you did not browse a Steam Store page with your personal information (such as your account page or a checkout page) in this time frame, that information could not have been shown to another user.

Valve is currently working with our web caching partner to identify users whose information was served to other users, and will be contacting those affected once they have been identified. As no unauthorized actions were allowed on accounts beyond the viewing of cached page information, no additional action is required by users.

How it happened

Early Christmas morning (Pacific Standard Time), the Steam Store was the target of a DoS attack which prevented the serving of store pages to users. Attacks against the Steam Store, and Steam in general, are a regular occurrence that Valve handles both directly and with the help of partner companies, and typically do not impact Steam users. During the Christmas attack, traffic to the Steam store increased 2000% over the average traffic during the Steam Sale.

In response to this specific attack, caching rules managed by a Steam web caching partner were deployed in order to both minimize the impact on Steam Store servers and continue to route legitimate user traffic. During the second wave of this attack, a second caching configuration was deployed that incorrectly cached web traffic for authenticated users. This configuration error resulted in some users seeing Steam Store responses which were generated for other users. Incorrect Store responses varied from users seeing the front page of the Store displayed in the wrong language, to seeing the account page of another user.

Once this error was identified, the Steam Store was shut down and a new caching configuration was deployed. The Steam Store remained down until we had reviewed all caching configurations, and we received confirmation that the latest configurations had been deployed to all partner servers and that all cached data on edge servers had been purged.

We will continue to work with our web caching partner to identify affected users and to improve the process used to set caching rules going forward. We apologize to everyone whose personal information was exposed by this error, and for interruption of Steam Store service.

Share this post:

FacebookTwitterLinkedInPinterest

Recent Videos

Metroid Prime 4: Beyond - Before You Buy

Metroid Prime 4: Beyond - Before You Buy

ROUTINE - Before You Buy

ROUTINE - Before You Buy

10 Upcoming FPS Games That LOOK INSANE

10 Upcoming FPS Games That LOOK INSANE

Red Dead Redemption (PS5 Switch 2) - Before You Buy

Red Dead Redemption (PS5 Switch 2) - Before You Buy

This Game Wants To Be SKYRIM 2 Before Elder Scrolls 6

This Game Wants To Be SKYRIM 2 Before Elder Scrolls 6

Marvel Cosmic Invasion - Before You Buy

Marvel Cosmic Invasion - Before You Buy

Top 25 BEST PS5 Games of 2025

Top 25 BEST PS5 Games of 2025

10 WEIRD GAMING Stories of November 2025

10 WEIRD GAMING Stories of November 2025

DESTINY 3 LEAKED, CONSOLE PRICES GOING UP AGAIN? & MORE

DESTINY 3 LEAKED, CONSOLE PRICES GOING UP AGAIN? & MORE

Category: Updates

Sidebar

Recent Posts

  • Grand Theft Auto 6 Is Officially Nominated As Most Anticipated Game In TGAs 2025
  • This Bundle Highlights Why Red Dead Redemption 2 Needs Upgrades On Consoles Too
  • Gearbox Dev Promises The Next Few Weeks Of Borderlands 4 “Will Be A Treat”
  • Have We Seen More Of Jason Duval In Grand Theft Auto 6 Than We Think?
  • GTA 6 Fans Discuss The Places In-Game They Want To Explore The Most

Copyright © 2025 · Gameranx · All Rights Reserved · Powered by Mai Theme