On July 8th, Teespring detected that the names and email addresses of some of its users had been acquired without authorization from our cloud infrastructure environment. The incident affected a number of other companies at the same time. Teespring had previously evaluated a 3rd party service called Waydev which required access to some of our data. This access was implemented via a technology called OAuth.
Unfortunately, Waydev retained the OAuth token for Teespring (and several other companies) which was accessed from Waydev without authorization by a third party. The token was then used to gain access to some of the Teespring infrastructure.
What’s been leaked?
There are two SQL files in the leaked Teespring archive, labeled “emails” and “users.”
The first file includes email addresses and last account update dates of 8,242,000 users:
The second file contains 4,000,000+ user records, including:
- Usernames
- Full names
- Locations
- Phone numbers
- Creator IDs
- Referral information
- Trust score
- Whitelisted seller campaigns, storefronts, bank check payouts, and other analytics data
If you have a Teespring account and your data has been exposed in this leak, we recommend you:
- Change your Teespring password and consider using a password manager to create strong passwords.
- Enable two-factor authentication (2FA) on all your online accounts.