Streaming platform Plex is asking customers to reset their passwords after disclosing a security breach involving one of its user databases.
In a post on Monday, the company confirmed that account information, including usernames, email addresses, scrambled passwords, and unspecified authentication data, was stolen. While the passwords were encrypted, Plex has not clarified whether the scrambling method could be cracked, raising uncertainty about the level of risk to users.
Plex has recommended customers reset their passwords through its official password reset form and log out of all connected devices.
Company Response
Plex stated that it has already fixed the vulnerability used to access the system but did not provide further details on when the breach occurred, how long attackers had access, or how many users were affected. With an estimated 25 million users worldwide, the scope of the breach remains unclear.
When asked about the hashing algorithm used for scrambling passwords—a key factor in determining security strength—the company declined to specify. Plex also has not revealed whether it has received any ransom demands or direct communication from the hackers.
While organizations that experience data breaches often force-reset passwords to ensure protection, Plex has stopped short of doing so. The company instead encouraged users to take action themselves. This choice has raised questions about its overall transparency and its handling of the incident.
Author’s Opinion
Plex’s decision not to force a universal password reset seems risky, especially when so many details remain unknown. Users deserve clarity on how secure their data really is and which protections were in place. Without transparency about when the breach occurred, what was accessed, and what safeguards are now active, Plex risks losing the trust of its global user base. In cybersecurity, silence often causes more damage than the breach itself.
Featured image credit: Wesley Fryer via Flickr
For more stories like it, click the +Follow button at the top of this page to follow us.