HIGH SEVERITYChilden

Club Penguin Rewritten Data Breach

Club Penguin Rewritten Fan Game Breach (2018): 1.7 Million Young Player Accounts Including Passwords Exposed

Fan-made recreation of Club Penguin game.

Verified by ObscureIQ Intelligence

7.0Severity
1.7MRecords
4Fields
2018Year

ObscureIQ Breach Intelligence Scores
10.8
Breach Risk Index
40
Data Value
25
Market Recency
419
days
Since Breach

Risk Interpretation

Primary risks include account takeover, password reuse, and harassment. Because the user base may include minors or young users, identity and safety risks are elevated.

🎯 Impact & Downstream Threats

The 2018 incident generated little direct cost to Club Penguin Rewritten as an operation, since the project was an unauthorized fan recreation rather than a licensed business with formal compliance obligations. There was no regulatory action tied to the breach, no public class-action filing, and no settlement. The site continued to operate for four more years before its 2022 takedown by Disney and UK police. The breach's longer-term significance is reputational: it sits alongside a larger 2019 i

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover
Geolocation & account flagging
Credential stuffing & account takeover
Cross-platform tracking & credential stuffing

📋 Breach Intelligence

EntityClub Penguin Rewritten
OrganizationOnline Community • Global
Breach Date2018-01-21
DBC Added2025-03-04
Added Date2025-03-04
Records~1.7M (1,688,052 records)
Attack VectorMisconfiguration
Threat ActorUnknown
SourceHave I Been Pwned / DataBreach.com / ObscureIQ
SensitivityMinors
Breach ID301;302
StatusConfirmed

📝 Executive Summary

Club Penguin Rewritten, an unauthorized fan recreation of Disney's Club Penguin game, suffered a data breach in January 2018. The incident exposed roughly 1.7 million unique email addresses tied to player accounts, alongside usernames, IP addresses, and passwords stored as bcrypt hashes.\n\nThe site was an independent project not affiliated with Disney, run by fans on the cprewritten.net domain. When contacted at the time, the team confirmed they were aware of the breach and stated that affected users had been notified. Bcrypt is a strong password-hashing algorithm, which limits the immediate risk of password recovery, but credential reuse across other services remains a concern.\n\nThe user base of Club Penguin Rewritten included a significant share of children under the age of thirteen, since the game was designed for and marketed to young players. That makes the breach particularly sensitive. The combination of email, username, and IP address can support credential stuffing, account takeover at other gaming or social services, and targeted contact attempts. Parents whose children registered at the site should rotate any reused passwords and remain alert to phishing aimed at young account holders.

🏢 About Club Penguin Rewritten

Club Penguin Rewritten was a fan-run online recreation of Disney's original Club Penguin multiplayer game, operating at cprewritten.net from around 2017 to 2022. The site was an unauthorized recreation produced and maintained by independent fans rather than Disney, and it functioned as a free-to-play web game with player avatars, in-game chat, and persistent accounts. Its user base was global and skewed young, with a substantial share of players under the age of thirteen. At its peak during the pandemic, the site reportedly added tens of thousands of new accounts a day.

Community | Online multiplayer game recreation | Fan-run gaming platform | Global
Online CommunityGlobalcprewritten.net

🗂 Why They Hold Your Data

Fan-run online gaming communities collect user accounts, usernames, emails, passwords, IP addresses, and in-game or community activity tied to multiplayer participation.

📰 Recent Developments

The fan game was shut down in April 2022 after Disney filed a copyright complaint and the City of London Police's Intellectual Property Crime Unit seized the website. Three individuals associated with the project were arrested on suspicion of distributing material infringing copyright. The cprewritten.net domain was placed under police control, and the project's Discord server, which had over 140,000 members, was wiped at the same time. The site has remained offline since. Various other fan recreations have appeared in its absence, but none under the Club Penguin Rewritten name.

🔍 Data Points Exposed

4 verified field types:
Email;Email
IP addresses
Passwords
Usernames

Canonical Fields

email_address, ip_address, password, username

🌐 Dark Web Verification

Confirmed

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Club Penguin Rewritten
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationChildenEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom