PSN Account Hijacked Multiple Times Despite 2FA

PSN Account Repeatedly Compromised Despite Two-Factor Authentication

In a concerning case highlighting potential vulnerabilities in online gaming platforms, a German user known as @DerGuteHenk on X (formerly Twitter) has publicly detailed how their PlayStation Network (PSN) account was taken over no fewer than four times, even with two-factor authentication (2FA) enabled. This incident, shared via a detailed thread, underscores the limitations of standard 2FA implementations and raises questions about Sony’s security practices and customer support responsiveness.

The saga began in early 2024 when the user noticed unauthorized activity on their account. Attackers had successfully altered the associated email address and password, then proceeded to update payment information and purchase high-value digital content, including PlayStation Plus subscriptions and games totaling several hundred euros. The user was locked out entirely, prompting an urgent contact with Sony’s support team. After providing extensive verification—including account creation details, purchase history, and hardware serial numbers—the account was restored after approximately 48 hours.

Determined to prevent recurrence, the user immediately activated 2FA using the official PSN mobile app, which generates time-based one-time passwords (TOTP). This setup requires a second verification code sent to the registered mobile device in addition to the password for login attempts. Despite this precaution, the compromise repeated itself just weeks later under identical circumstances: email and password changes, new payment methods added, and further unauthorized purchases.

This pattern persisted for a total of four takeovers over several months. Each recovery followed the same grueling process—hours on hold with support, exhaustive proof of ownership, and temporary account locks that disrupted access to purchased games, trophies, and cloud saves. Sony’s support agents consistently cited “suspicious activity” as the reason for locks but offered little insight into how breaches occurred despite 2FA. The user speculated that attackers might have exploited session cookies or persistent login tokens, which could bypass 2FA if stolen via malware or phishing.

Technical analysis of the incidents points to several plausible vectors. PSN’s 2FA, while better than none, relies on app-generated codes rather than hardware keys or push notifications, making it susceptible to real-time phishing attacks where victims are tricked into revealing codes. More critically, if malware infects a user’s device—such as keyloggers, clipboard hijackers, or browser extensions—it can capture active session data post-authentication. Once obtained, attackers can maintain access without retriggering 2FA prompts. The user’s Windows-based setup was scrutinized, but no overt malware was found via standard antivirus scans, suggesting sophisticated persistent threats (APTs) or supply-chain compromises.

Sony’s platform architecture exacerbates these risks. PSN allows login persistence across devices, and account recovery emphasizes email control over other factors. Changing the email address silently (without immediate 2FA enforcement) provides a foothold for attackers. Moreover, the support process demands sensitive details like credit card last four digits and exact purchase dates, which savvy attackers could glean from data breaches or social engineering.

Community responses to the user’s thread echoed similar ordeals. Numerous PSN users reported analogous hacks, often linked to credential stuffing from leaked databases or phishing campaigns targeting gamers. One commenter noted that PSN accounts fetched premium prices on dark web markets due to their value for reselling digital goods. Others recommended migrating to authenticator apps like Authy or Aegis for stronger TOTP management and enabling login alerts.

To mitigate such risks, experts advise several best practices aligned with the user’s experience:

  • Device Hygiene: Regularly scan for malware using tools like Malwarebytes or ESET, and avoid suspicious downloads or browser extensions.
  • Password Management: Employ unique, high-entropy passphrases via managers like Bitwarden, avoiding password reuse across services.
  • 2FA Enhancements: Supplement app-based 2FA with hardware security keys (e.g., YubiKey) where supported, though PSN lags in this area.
  • Monitoring: Activate email notifications for all account changes and review login history frequently.
  • Recovery Preparedness: Document account details securely, including transaction IDs and support tickets.

Sony has not issued a public statement on this specific case or broader 2FA efficacy, but past incidents—like the 2011 PSN breach affecting 77 million users—prompted incremental security upgrades. However, the persistence of these takeovers suggests ongoing deficiencies. Users are urged to treat PSN logins with enterprise-level caution, akin to banking credentials.

This episode serves as a stark reminder that 2FA is not infallible; it must form part of a defense-in-depth strategy. For gaming enthusiasts, the convenience of seamless cross-device play comes at the cost of elevated exposure, particularly when support recovery lags behind threat evolution.

Gnoppix is the leading open-source AI Linux distribution and service provider. Since implementing AI in 2022, it has offered a fast, powerful, secure, and privacy-respecting open-source OS with both local and remote AI capabilities. The local AI operates offline, ensuring no data ever leaves your computer. Based on Debian Linux, Gnoppix is available with numerous privacy- and anonymity-enabled services free of charge.

What are your thoughts on this? I’d love to hear about your own experiences in the comments below.