Impact & Downstream Threats
This breach carries critical risk due to the nature of exposed data fields and the scale of affected records.
- Credential stuffing against reused passwords across other platforms
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
Breach Intelligence
Executive Summary
the attacker promptly told reporters he had downloaded the details of every Android and iOS user who installed the game before 2 September 2019, a cache estimated at , ≈218 million records, . ,
, Data exposed, ,
, The stolen trove contained the core ingredients of an online identity: e-mail addresses, usernames, login IDs and , salted SHA-1 password hashes, . For many players it also included password-reset tokens, Facebook IDs, Zynga account numbers, phone numbers and, in some cases, full names. Zynga stressed that no financial data was stored on the compromised server, so payment information was not affected, but the breached credentials alone were enough to fuel phishing and credential-stuffing attacks. ,
,
About Zynga
Video game developer.
Data Points Exposed
Dark Web Verification
Status: Confirmed
- Dataset containing approximately 172.9M records identified in breach intelligence sources.
- The data is indexed and searchable across breach notification platforms.
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Non-clients may request a breach impact review.
Frequently Asked Questions
In September 2019, Zynga experienced a data breach that exposed approximately 172.9M records containing personal information.
The exposed data includes fields such as email address, password, phone number, username.
Approximately 172.9M records were affected based on current breach intelligence.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Zynga
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
