Heads up, Reborn Community
We want to be fully transparent about a security incident that affected the Reborn Gaming Store.
On April 29, 2026, a critical cPanel/WHM vulnerability was publicly disclosed. This authentication bypass exploit allowed unauthorized remote access to the Reborn Gaming store page.
Between April 30, 2026, from 2:20 AM EST to 2:45 AM EST, unauthorized attackers gained access to the Reborn Gaming Store backend through this vulnerability. The issue was identified, contained, and full control of the affected systems were restored.
If you have logged into the Reborn Gaming Store at least once, the following data may have been accessed:
- Steam Names
- Steam ID
- Email addresses
- IP addresses
Absolutely no passwords or payment methods were compromised.
The Reborn Gaming store does not process or store payment details, nor store passwords, but rather relies on third-party services like Stripe and Steam, both of which did not experience this security incident.
While the exposed data is limited, please stay alert for phishing attempts or suspicious emails claiming to be from Reborn Gaming.
Official Reborn Gaming emails will ONLY come from @reborngaming.net and @reborngamingnetwork.onmicrosoft.com.
If you receive emails from any other domain claiming to represent us, treat them as suspicious and compare the email addresses with the above.
By the time you are reading this, we have patched and secured the vulnerability, removed unauthorized access, conducted an internal review of affected systems, and increased monitoring and security controls.
At this time, the vulnerability has already been addressed and attackers no longer have access to Reborn Gaming systems.
We sincerely apologize for this incident and appreciate your trust, patience, and vigilance. Protecting and maintaining our integrity with our community is the top priority.
We want to be fully transparent about a security incident that affected the Reborn Gaming Store.
On April 29, 2026, a critical cPanel/WHM vulnerability was publicly disclosed. This authentication bypass exploit allowed unauthorized remote access to the Reborn Gaming store page.
Between April 30, 2026, from 2:20 AM EST to 2:45 AM EST, unauthorized attackers gained access to the Reborn Gaming Store backend through this vulnerability. The issue was identified, contained, and full control of the affected systems were restored.
If you have logged into the Reborn Gaming Store at least once, the following data may have been accessed:
- Steam Names
- Steam ID
- Email addresses
- IP addresses
Absolutely no passwords or payment methods were compromised.
The Reborn Gaming store does not process or store payment details, nor store passwords, but rather relies on third-party services like Stripe and Steam, both of which did not experience this security incident.
While the exposed data is limited, please stay alert for phishing attempts or suspicious emails claiming to be from Reborn Gaming.
Official Reborn Gaming emails will ONLY come from @reborngaming.net and @reborngamingnetwork.onmicrosoft.com.
If you receive emails from any other domain claiming to represent us, treat them as suspicious and compare the email addresses with the above.
By the time you are reading this, we have patched and secured the vulnerability, removed unauthorized access, conducted an internal review of affected systems, and increased monitoring and security controls.
At this time, the vulnerability has already been addressed and attackers no longer have access to Reborn Gaming systems.
We sincerely apologize for this incident and appreciate your trust, patience, and vigilance. Protecting and maintaining our integrity with our community is the top priority.