
Twilio has denied in a statement for BleepingComputer that it was breached after a threat actor claimed to be holding over 89 million Steam user records with one-time access codes.
The threat actor, using the alias Machine1337 (also known as EnergyWeaponsUser), advertised a trove of data allegedly pulled from Steam, offering to sell it for $5,000.
When examining the leaked files, which contained 3,000 records, BleepingComputer found historic SMS text messages with one-time passcodes for Steam, including the recipient's phone number.
.jpg)
Source: BleepingComputer
Owned by Valve Corporation, Steam is the world's largest digital distribution platform for PC games, with over 120 million monthly active users.
Valve did not respond to our requests for a comment on the threat actor's claims.
Independent games journalist MellolwOnline1, who is also the creator of the SteamSentinels community group that monitors abuse and fraud in the Steam ecosystem, suggests that the incident is a supply-chain compromise involving Twilio.
MellowOnline1 pointed to technical evidence in the leaked data that indicates real-time SMS log entries from Twilio's backend systems, hypothesizing a compromised admin account or abuse of API keys.
Twilio is a cloud communications company that provides APIs for sending SMS, voice calls, and 2FA messages, widely used by apps like Steam for user authentication.
When asked by BleepingComputer about their possible involvement in the alleged Steam breach, a Twilio spokesperson acknowledged the situation and confirmed they're investigating.
Twilio takes these threats very seriously and is reviewing the alleged incident. We will provide more information as it becomes available," a company spokesperson told BleepingComputer.
Twilio later followed up with a statement clarifying that the company's systems had not been breached.
"There is no evidence to suggest that Twilio was breached. We have reviewed a sampling of the data found online, and see no indication that this data was obtained from Twilio." - Twilio spokesperson
Looking at the data, one possible explanation for its origin is a leak from an SMS provider that intermediates the communication of one-time access codes between Twilio and Steam users.
Some of the messages delivered are clearly confirmation codes for accessing a Steam account or for associating a phone number with one.
However, BleepingComputer could not determine if the data comes from an SMS provider or who it might be. Additionally, we could not verify the threat actor's claims.
It is worth mentioning that some of the data is relatively new, as we found many of the delivery dates were from the beginning of March.
Twilio provides a two-factor authentication (2FA) product called Verify API that customers, game providers among them, can implement with various communication channels (SMS, WhatsApp, voice, email, passkeys, silent device approval, push, or time-based one-time passwords).
Out of abundance of caution, Steam users are recommended to enable Steam Guard Mobile Authenticator for additional security and monitor account activity for unauthorized login attempts.
Update 5/15 - Steam has issued a statement in regards to the alleged breach, denying their systems were compromised.
The gaming platform clarified that the leaked set appears to contain SMS with one-time codes that are valid for 15 minutes, and hence are no longer exploitable.
Steam assured users their accounts are safe, stating they need to take no action in response to the incident.
Break down IAM silos like Bitpanda, KnowBe4, and PathAI
Broken IAM isn't just an IT problem - the impact ripples across your whole business.
This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.






Comments
hlve - 7 months ago
Why are people storing their 2FA in Twilio when Steam Guard exists?
lightwo - 7 months ago
In order to register for Steam Guard, you need to provide a phone number. This phone number is used for account recovery which can bypass Steam Guard.
However, I cannot find evidence this data breach contains real data, and SMS verification is time-limited anyway, so from my understanding, the only useful resource could be phone numbers. Even then, I believe this data breach was fake.
Also, Twilio appears to be completely unrelated, according to this post following an alleged response from a Valve representative:
https://x.com/MellowOnline1/status/1922458687316074640
non-entity - 7 months ago
steam doesn't use SMS codes...