HIGH SEVERITYChilden

i-Dressup Data Breach

i-Dressup Children's Casual Gaming Platform Breach (2016): 2.2 Million Young Player Accounts Including Passwords Exposed

Online gaming site focused on dress-up and casual games for younger audiences. Users interact through browser-based games, often with optional accounts and light personalization features.

Verified by ObscureIQ Intelligence

7.0Severity
2.2MRecords
2Fields
2016Year

ObscureIQ Breach Intelligence Scores
12.0
Breach Risk Index
40
Data Value
25
Market Recency
453
days
Since Breach

Risk Interpretation

High sensitivity because children may be affected. Exposure enables account takeover, harassment, grooming-adjacent abuse, and targeting of minors or family-linked accounts.

🎯 Impact & Downstream Threats

The institutional impact on i-Dressup was effectively terminal. The site was forced offline by the New Jersey Department of Consumer Affairs and ultimately shut down following the FTC settlement. Unixiz, Inc. and named officers Zhijun Liu and Xichen Zhang accepted a $35,000 civil penalty plus permanent COPPA compliance obligations. The case has been formally cited in subsequent FTC enforcement actions and in industry guidance about COPPA's data-security requirements, which had previously been le

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Credential stuffing & account takeover

📋 Breach Intelligence

Entityi-Dressup
Organization • Global
Breach Date2016-07-15
DBC Added2025-01-29
Added Date2025-01-29
Records~2.2M (2,202,662 records)
Attack VectorMisconfiguration
Threat ActorUnknown (FTC enforcement case; SQL injection)
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityMinors
Breach ID670;671
StatusConfirmed

📝 Executive Summary

i-Dressup, an online dress-up and casual gaming website operated by Unixiz, Inc. and directed primarily at children, suffered a data breach in mid-2016 when an attacker exploited what the U.S. Federal Trade Commission later described as commonly known and reasonably foreseeable vulnerabilities. The attacker accessed the personal information of approximately 2.1 million users, including approximately 245,000 users who had indicated on registration that they were under 13 years of age. The attacker contacted i-Dressup with a warning that went unheeded and subsequently sent the breach data to journalists. i-Dressup discovered the intrusion in September 2016. The breach was redistributed as part of a larger corpus of data and was indexed by Have I Been Pwned and DataBreach.com on January 28-29, 2025.

The breach affected approximately 2.1 million to 2.2 million users based on records indexed by breach-tracking services. Compromised fields included email addresses, usernames, dates of birth, and passwords. Critically, i-Dressup stored and transmitted user passwords in plaintext rather than as hashed values, exposing the original credentials directly. The FTC also documented that i-Dressup failed to perform vulnerability testing of its network even for well-known threats such as SQL injection, did not implement intrusion detection or prevention systems, and did not monitor for security incidents.

For affected users and the parents and guardians of the approximately 245,000 affected children under 13, the practical risk profile combines credential-reuse exposure with significant child-safety concerns. Because i-Dressup stored passwords in plaintext, any account where the user reused the same password was immediately compromised, with credential-stuffing risks expected on email, gaming, and other accounts. Date of birth and email exposure for minors raises additional risks because child personal information has long-tail value for identity fraud that can go undetected for years until the child applies for credit, financial accounts, or employment as a young adult. Parents and guardians should freeze credit at all three U.S. bureaus for any minor children whose data may have been exposed, change any reused passwords for the child or their family members, and remain alert to phishing or social-engineering attempts referencing children's gaming accounts. Because i-Dressup is no longer operating, affected individuals will not receive direct notification and should treat any credentials that may have been used on the platform as fully compromised across all uses.

🏢 About i-Dressup

i-Dressup was an online dress-up and casual gaming website operated by Unixiz, Inc., headquartered in California, with CEO Zhijun Liu and Secretary Xichen Zhang as named officers. The site allowed users to play dress-up games, design clothes, and decorate virtual personal spaces, alongside social and community features that included blog posting and user-to-user communication. i-Dressup's user base was concentrated in younger audiences, with the site stating that most members were 'boys and girls between 7 and 17,' and the company was subject to the U.S. Children's Online Privacy Protection Act (COPPA). The site is now defunct, having been forced offline by the New Jersey Department of Consumer Affairs and ultimately shut down following federal enforcement action.

Platform | Children’s dress-up and casual games | Browser-based gaming platform | Global
Global* defunct i-dressup.com

🗂 Why They Hold Your Data

Children’s casual gaming platforms collect user accounts, usernames, emails, device data, gameplay activity, and in some cases profile details tied to browser-based play.

📰 Recent Developments

i-Dressup is no longer operating. Following the 2016 breach disclosure and a New Jersey Department of Consumer Affairs action that took the site offline, the U.S. Federal Trade Commission and the U.S. Department of Justice filed a 2019 complaint against Unixiz, Inc., CEO Zhijun Liu, and Secretary Xichen Zhang for violations of the Children's Online Privacy Protection Act. The FTC settled the case in April 2019, with the defendants agreeing to pay a $35,000 civil penalty and accepting a permanent prohibition against violating COPPA in the future. The settlement also bars the defendants from collecting, selling, or sharing personal information until they implement a comprehensive data security program with biennial independent assessments. The case has been widely cited as a leading example of FTC enforcement combining COPPA parental-consent violations with data-security failures and as illustrating the regulatory consequences of inadequate child-data protection.

🔍 Data Points Exposed

2 verified field types:
Password
Email;Email
Passwords

Canonical Fields

email_address, password

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of i-Dressup
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationChildenEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom