> series: anatomy_of_a_breach —— part: 154 —— target: twitch —— data: 128GB —— contents: source_code_earnings_internal_tools<span class="cursor-blink">_</span>_
On 6 October 2021, an anonymous user posted a 128GB torrent to 4chan containing what appeared to be the entirety of Twitch's internal code and data. The leak included Twitch's complete source code repository (with commit history), internal tools and services, an unreleased Amazon Game Studios project codenamed 'Vapor' (a Steam competitor), proprietary SDKs, and — the detail that generated the most public attention — the complete payout data for Twitch's top streamers, revealing that the platform's highest earners received millions of dollars annually.
Twitch confirmed the breach and attributed it to a server misconfiguration that allowed unauthorised access to its internal systems. The company stated that user passwords were not exposed (they were hashed with bcrypt) and that full credit card numbers were not stored on Twitch's systems. However, the exposure of the entire source code — including security-related code — enabled attackers to identify vulnerabilities in Twitch's codebase. Twitch reset all stream keys as a precautionary measure. The leak was labelled 'part one' by the leaker, though no subsequent parts were published.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Twitch breach reinforced two fundamental principles: first, server and cloud misconfigurations continue to be the most common root cause of major data exposures — from MongoDB (2017) through Microsoft (2020) to Twitch (2021). Second, source code is a crown-jewel asset whose exposure enables further attacks. Both require continuous verification through testing.
Cloud configuration reviews identify misconfigurations. Application testing identifies the vulnerabilities that source code exposure would reveal. Cyber Essentials mandates secure configuration. SOC in a Box monitors for data exfiltration and configuration changes. And UK Cyber Defence provides incident response when source code or sensitive internal data is exposed.
<a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> find misconfigurations. <a href="/penetration-testing/web-application">Application testing</a> identifies vulnerabilities. <a href="/cyber-essentials">Cyber Essentials</a> mandates secure configuration.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call