Roku Data Breach: Over 15,000 Accounts Affected

Will Gendron
Editor in Chief
Published
March 11, 2024
Updated
June 28, 2024
Roku Data Breach: Over 15,000 Accounts Affected
Roku
Types of INFORMATION affected
  • Names
    Names
  • Social security numbers
    Social Security Numbers
  • Dates of birth
    Dates of Birth
  • Addresses
    Addresses
  • Government IDs
    Government IDs
  • Medical Information
    Medical Info
  • Financial Info
    Financial Info

Understanding the Roku Data Breach

Roku, Inc., the leader in streaming television platforms in the U.S., recently faced a data breach that may have affected your account. As a company that values viewer privacy and security, Roku is actively addressing the situation and has provided detailed information to assist affected users.

Between December 28, 2023, and February 21, 2024, unauthorized parties accessed certain individual Roku accounts. The breach was discovered during this period, and the company promptly initiated an investigation. It was found that usernames, passwords, and account login information were compromised, potentially affecting 15,363 individuals in the United States, including 76 in the state of Maine.

Roku has reported the incident to the Attorney General's offices, including the state of California. For further details, you can review the disclosures on the Maine Attorney General's website and the California Attorney General's website.

Immediate Steps Taken by Roku

Upon detecting the breach, Roku took swift action to secure the accounts from further unauthorized access. This included resetting passwords for potentially impacted accounts, investigating account activity, canceling unauthorized subscriptions, and issuing refunds for any unauthorized charges. Roku has also been actively monitoring for any additional suspicious activity to ensure the security of customer data.

What You Should Do

If you suspect your account may have been affected, it is crucial to take the following steps:

  • Reset your Roku account password by visiting my.roku.com and using the "Forgot password?" option.
  • Review the subscriptions and devices linked to your Roku account from your account dashboard.
  • Use strong, unique passwords for all your online accounts.
  • Monitor your account statements, credit reports, and other online account information for any suspicious activity.

Roku has provided a Notice to Consumers on March 8, 2024, via written communication, outlining the steps affected users should take to protect their information. This notice includes detailed instructions and resources to help you safeguard your identity and personal data.

Additional Resources and Support

For more information on identity theft protection and credit monitoring services, you can refer to the Information about Identity Theft Protection included in the Notice to Consumers. Roku has also set up a dedicated phone line at 1-816-272-8106 and an email address at account-help@roku.com for any questions or concerns you may have regarding the breach.

Roku sincerely regrets the inconvenience caused by this incident and is committed to maintaining the privacy and security of your information. As we navigate the aftermath of this breach, Roku will continue to update affected users and take any additional steps necessary to prevent future incidents.

For further guidance, you can also contact the Federal Trade Commission or your state Attorney General's office for assistance with identity theft and fraud prevention. Remember, staying informed and vigilant is key to protecting your personal information in the digital age.

Notice Letter

This browser does not support inline PDFs. Please download the PDF to view it: Download PDF

Affected Entity
Roku
Consumers Notification date
3/8/2024
Date of Breach
December 28, 2023
Breach Discovered Date
1/4/2024 - 2/21/2024
Total People Affected
15,363
Information Types Exposed
- Usernames - Passwords - Roku account login information - Streaming subscription details

Join the

Roku

data breach lawsuit. It's free to join. 

Join the Lawsuit
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image
CTA Image