millions of accounts from Dueling Network , a now-defunct Flash game based on the Yu-Gi-Oh trading card game . Although Dueling Network itself shut down in 2016 in response to a cease-and-desist order , the site 's forum continued running until recently . The message currently displayed on the Dueling Network forum . `` Only our forum site was still up as a way for our users to communicate with each other ( login used DN [ Dueling Network ] credentials ) . Now that is down and warns users to change passwords on any other sites they may have used the same password on , '' Black Luster Soldier , a Dueling Network administrator , told Motherboard in an email . The hacker appears to have stolenAttack.Databreachat least 6.5 million accounts , although Black Luster Soldier cautioned that not all of those necessarily correspond to individual players . `` At the moment , the claim that information has been breachedAttack.Databreachfor 6.5 DN million accounts appears to be accurate . Note that many accounts are duplicates owned by the same user or were never actually logged in , so this number is inflated , '' they said . The data includes user email addresses and passwords hashed with the notoriously weak MD5 algorithm , meaning hackers will likely be able to obtainAttack.Databreacha number of users ' plaintext passwords as well . Paid breach notification service LeakBase provided Motherboard with a small sample of accounts for verification purposes . Motherboard attempted to contact over 50 alleged victims , but has not received a reply at the time of writing . Black Luster Soldier 's working theory is that the hacker used a vulnerability in MySQL to obtainAttack.Databreachthe data . The lesson : As Black Luster Soldier advised , users should change their passwords on any other services with the same credentials as Dueling Network . Even if data from the breached site is n't all that valuable in and of itself , if someone has used the same password on another site , hackers can easily try to access other more serious accounts too
Media Prima Berhad 's computer systems have been locked out by cyber attackers who are demandingAttack.Ransommillions of ringgit in ransomAttack.Ransom. The media company , which runs a stable of TV and radio channels , newspapers , advertising and digital media companies was hit by a ransomware attackAttack.Ransomlast Thursday ( Nov 8 ) , The Edge Financial Daily reported . Ransomware is a type of malicious software ( malware ) designed to block access to a computer system until a sum of money is paidAttack.Ransom. The report , quoting a source , said the attackers are demandingAttack.Ransom1,000 bitcoins to release access to the computer systems . This means that the attackers are demanding a ransomAttack.Ransomof RM26.42 million ( S $ 8.71 million ) . Media Prima is listed on Bursa Malaysia 's main board . It operates , among others , three national newspapers , namely New Straits Times , Berita Harian and Harian Metro ; free-to-air television stations , namely TV3 , TV9 , ntv7 and 8TV ; and four radio stations , namely Fly FM , Hot FM , One FM and Kool FM . When contacted , Media Prima group managing director , Datuk Kamal Khalid , declined to comment when asked to confirm whether the company has been hitAttack.Ransomby ransomware . He urged The Star to get in touch with the company 's corporate communications department for comments , and efforts are ongoing to contact the department . The Edge Financial Daily report said it was not immediately known whether Media Prima 's data has been breachedAttack.Databreach, and whether the media group would be suffering financial losses due to the ransomware attackAttack.Ransom. It quoted another source saying that Media Prima 's office e-mail has been affected but that the company has migrated the email to another system . The source reportedly added that Media Prima has decided not to pay the ransomAttack.Ransom.