VTech Data Breach: What to Do Now

UPDATED 9:15 a.m. and 4 p.m. EST Tuesday, Dec. 1 with additional information.

Another day, another compromised customer database. This time, an attacker hit a  customer-information database belonging to the Hong Kong-based tech-for-tots company VTech.

Image: VTech/YouTube

Image: VTech/YouTube

Information pertaining to both parents and their children — including parents' full names, email addresses and physical addresses, and children's first names and dates of birth — was apparently poached, although VTech has not attributed this theft to any specific person or persons.

Australian security researcher Troy Hunt found that the VTech database contained 4.8 million unique customer accounts and 227,622 child account records, both related to VTech's Learning Lodge app store.

MORE: 7 Easy Ways to Get Your Identity Stolen

More significantly, Hunt explained that most of the user passwords were encrypted with the very weak MD5 algorithm, without "salts" that would make them harder to crack. Many free software programs can crack unsalted MD5 passwords, and you can even try it yourself here. Hunt said the database also held answers to password-change security questions, which were stored without any encryption at all.

Children's last names and addresses were not part of the stolen data, but each child was linked to a parent's account. If a child shares a surname and physical address with a parent, the child is at heightened risk of identity theft, as a full name, date of birth and mailing address are often sufficient to open a fraudulent account.

According to VTech, the attack happened Nov. 14, but that the company only discovered the attack when "a Canadian journalist" — presumably Lorenzo Franceschi-Biccherai, a Italian journalist working in New York for the (formerly Canadian) VICE Motherboard tech-news website, and who broke the story — inquired about the breach Nov. 23.

Franceschi-Biccherai reported that VTech was hit by a simple SQL-injection attack,  a common method of breaching online databases that even the teenager next door could probably pull off. VTech said it informed customers about the attack Nov. 27, but claimed user credit-card information was safe, as purchases are made through a secure off-site, third-party partner.

What to do

If you are a parent with a Learning Lodge account, you should check Hunt's Have I Been Pwned? website, which compiles information from data breaches and now includes customer accounts stolen from VTech.

If you have a Learning Lodge account at all, you should change your password immediately, and also change the password on any other online account for which you used the same password. While we do not recommend users ever reuse passwords across different accounts, this is a great time for VTech users to make sure their Learning Lodge account passwords aren't the same as those they use to log into their other online accounts. 

Additionally, since the answers to security questions were also stolen, VTech users should no longer use those answers for security questions again. Instead, we suggest you use incorrect answers to questions like “Who was your favorite teacher?” and keep track of these answers in a password manager or notebook.

The only possible good news here is that the purported hacker told Franceschi-Biccherai that he or she had no intention of selling or distributing the stolen information. But we've got only the hacker's word for that.

UPDATE 9:15 a.m. Tuesday: The unnamed hacker who stole the VTech data told VICE Motherboard in a story posted Monday (Nov. 30) that the data also contained "thousands of pictures of parents and kids and a year's worth of chat logs," and some audio files. The new files were related to Kid Connect, a VTech mobile app for iOS and Android that lets parents communicate with kids who are using VTech devices.

The hacker told Motherboard that he downloaded 190GB of images, mostly headshots of parents and children. He shared nearly 4,000 of the images with Motherboard.

"Frankly, it makes me sick that I was able to get all this stuff," the hacker told Motherboard's Lorenzo Franceschi-Biccherai. "VTech should have the book thrown at them."

UPDATE 4 p.m. EST Tuesday: VTech has updated its FAQ on the data breach with the news that profiles of 6.4 million children, including first (but not last) names, birthdates and genders, were compromised. The children's profiles were linked to the 4.8 million parent accounts.

About 2.2 million parent accounts and 2.9 million child profiles were from the United States; 238,000 accounts and 316,000 child profiles belonged to Canadian users.  Other countries with large numbers of compromised accounts and profiles were France, the United Kingdom and Germany.

VTech has assigned dedicated email addresses in different countries to which concerned customers can direct queries. American customers can email vtechkids@vtechkids.com; Canadian customers should contact toys@vtechcanada.com.

The company would not confirm that images of and chats between parents and children had been compromised, as reported earlier, but noted that the images and audio files were "encrypted by AES128," referring to a common encryption algorithm. Motherboard's report did not mention any difficulty in viewing the images or listening to audio files.

"Regretfully, our database was not as secure as it should have been," the updated company FAQ now states.

TOPICS
Henry T. Casey
Managing Editor (Entertainment, Streaming)

Henry is a managing editor at Tom’s Guide covering streaming media, laptops and all things Apple, reviewing devices and services for the past seven years. Prior to joining Tom's Guide, he reviewed software and hardware for TechRadar Pro, and interviewed artists for Patek Philippe International Magazine. He's also covered the wild world of professional wrestling for Cageside Seats, interviewing athletes and other industry veterans.

Latest in Online Security
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Green skull on smartphone screen.
Malicious Android apps with 60 million installs bombarding phones with ads and phishing attacks — how to stay safe
Latest in News
Apple Watch Series 10
Future Apple Watch models could get a surprising new feature — what we know
iPhone 16 Pro vs iPhone 16 Pro Max in hand showing displays
Forget iPhone 17 — iPhone 18 could get this huge upgrade
The new Husqvarna iQ series robot lawn mower.
Husqvarna’s new robot mowers offer GPS for less
Rendered images of rumored foldable iPhone.
Foldable iPhone report just revealed key details — here's what we know
NYTimes Connections
NYT Connections today hints and answers — Sunday, March 23 (#651)
NYT Strands on a cellphone
NYT Strands today — hints, spangram and answers for game #385 (Sunday, March 23 2025)