Dark‑web seller listed 50 million Roblox login records for $777, researchers warn
Brinztech warned a dark‑web listing offered roughly 50 million Roblox login records for sale at $777, exposing children and creators to account takeover and financial risk.

A dark‑web seller offered roughly 50 million Roblox login records for sale at a fixed price of $777, cyber‑intelligence firm Brinztech warned in an alert published March 8. The firm said the cache appears to be either a Roblox‑only extract from a larger compilation of credentials or the result of a targeted data collection, a breach that would put players, underage users and content creators at immediate risk.
The database size and the low asking price signal a mass‑market approach to monetizing credentials, Brinztech noted. Criminals who buy such lists can use automated credential‑stuffing tools to take over accounts, drain virtual wallets, impersonate children or creators, and leverage contact information for phishing and doxxing. For creators who monetize games and virtual items, account takeover can translate into real‑world financial losses and disruption of income streams.
Roblox is a platform widely used by children and a marketplace for user‑generated content. Its creator economy pays out revenue for popular games and virtual items, which creates an incentive for attackers to target high‑value accounts. The presence of millions of records on the dark web also raises the risk that malicious actors will harvest personal information for grooming or extortion, greatly increasing safety concerns for younger users.
Brinztech’s alert did not publish examples of records or detail whether passwords were hashed or in plaintext. The firm recommended rapid action by platform operators and users. Industry practice in similar incidents includes forcing password resets for compromised accounts, issuing notifications to affected users, and accelerating adoption of multi‑factor authentication. For parents and creators, the immediate steps are straightforward: change reused passwords, enable multi‑factor authentication where available, and watch for suspicious messages requesting payments or personal information.

The low fixed price contrasts with earlier, higher‑value targeted breaches sold privately to elite buyers, and it increases the probability of widespread abuse. When credentials are cheap, more attackers can attempt account takeovers, and automated attackers can quickly scale attacks across millions of accounts. That dynamic also makes remediation harder: account holders who do not receive direct notifications may remain vulnerable for months.
The incident underscores the persistent vulnerability of large consumer platforms to credential aggregation and resale. Platforms that host minors and support creator economies have particular obligations to detect abuse, notify users, and provide simple security tools tailored to families and professional creators. Regulators in several jurisdictions have tightened rules around breach notification and child safety online; rapid, transparent action by Roblox, if the company confirms affected accounts, would also shape how policymakers respond.
For now, the near‑term consequence is clear: hundreds of thousands, potentially millions, of Roblox users could face account compromise. Protecting those accounts will require both immediate technical measures from the platform and prompt security hygiene by users and parents. The listing also offers a reminder that cheap credential data on the dark web remains a central vector for online harm.
Sources:
Know something we missed? Have a correction or additional information?
Submit a Tip

