Bin Weevils Scratch
- Make Bin Weevils unblocked on the school websites. 0 have signed. Let’s get to 200! James Littlejohns started this petition. We need this so we can challenge our.
- Oct 05, 2019 Remove contaminated food products. Sounds like a no-brainer, but this might be the single most important step in getting rid of weevils. Look through your ENTIRE pantry and every single cupboard for any food products that might be contaminated.
- May 06, 2017 This feature is not available right now. Please try again later.
- Bin Weevils is an online children's multiplayer game developed by 55Pixels Ltd, launched in January 2004 as a joint venture between Nickelodeon UK and Prism Entertainment Ltd. Brief animated clips based on characters from the game aired on TV in 2006. In 2007, Bin Weevils was re-launched as an independent website with a redesign and new content.
Welcome to drewbian's first Let's Play on Bin Weevils! Today I'm doing a bit of a walk through for the new game, RUM'S LUGGAGE RUMMAGE! I give you guys some of my TOP TIPS for playing and just hav. Bin Weevils Safety Policy. Bin Weevils takes the safety of all its players very seriously. We pride ourselves on keeping a secure, safe environment that allows kids of all ages to express themselves with a wide variety of allowed words and phrases (whitelist), while also. Scratch is a free programming language and online community where you can create your own interactive stories, games, and animations.

We’ve seen it before – in fact, we seem to be seeing it a lot recently – data from an old hack first being publicly leaked. This time it’s Bin Weevils, a British online children’s game, owned by 55 Pixels.
In September 2014, Bin Weevils posted a note on their site that they had discovered a “vulnerability” affecting usernames and passwords. In response, they forced a password reset and added some unspecified security features. Their note does not seem to inform users that the data were actually hacked and acquired. And based on data provided to DataBreaches.net yesterday and today, they did not fully disclose the types of information that were hacked.
Yesterday, DataBreaches.net was contacted by “ShohidzIslam,” who wrote that he had learned of a database that was now being released to the public by hackers going by the names of “Pure”, “LukeBaxter”, “Akshay”, “Tyrone” and “Philip.” A link to the data had reportedly been posted in an IRC chat.

The file, which DataBreaches.net obtained and inspected, consisted of 1,022,883 records. Each record included the user’s username, encrypted password (salt+hash), and in-game data like their pet’s ID number, pet’s name, and date of registration. A line at the top of the dump credits “jkb, legit, lukebaxter, tyrone, philip, pure, akshay.”
ShohidzIslam informed DataBreaches.net that he asked the hackers if they also had IP addresses and email addresses. In response, they provided a redacted screenshot showing all of the fields, which did include both registration and login IP addresses, as well as email addresses.
“Luke Baxter” allegedly informed him that they were reserving the full data set with the email addresses and IP addresses as they might sell all of the data privately at some future time. The 1-million record sample was to alert the public that the data were out there, but he claimed that the full data set has approximately 20 million records.
Retrieved 24 October 2019. Jacobs, Ashley (6 February 2016). From the original on 24 October 2019. Bin weevils memeulous.
Data in the dump were dated from 2014, which would be consistent with the incident reported in September, 2014 by Bin Weevils. Attempts to verify the data by trying to create new accounts using usernames in the dump resulted in messages that the tested usernames were already taken. Data in the redacted screenshot corresponded to data found in the data sample, although it appeared to be from a different database as the order of the rows did not match.
Evidence that the hackers have email addresses obviously raises questions about Bin Weevils’ report that the breach affected (only) usernames and passwords. Based on Bin Weevil’s About page and Privacy Policy, the email addresses are likely the parents’ email addresses. Parents might understandably want to have been informed if their email addresses with some of their children’s information had been acquired by hackers.
DataBreaches.net sent Bin Weevils an inquiry yesterday asking them to confirm whether email addresses and IP addresses were also in the hacked database, and to confirm or deny the claim of approximately 20 million records, but has received no reply other than an auto-responder.
DataBreaches.net will update this post if additional information is obtained.
Update of August 20, 2017: DataBreaches.net received an email from a sender identifying themselves as “Akshay,” that claimed, in part:
Bin Weevils Scratch Recipe
… The information on that link I have given has the name ‘akshay’ in, who did not have anything to do with the games database being released, the name was used to blame another individual.
Moshi Monsters
I have copy and pasted the lines on your website containing the name ‘akshay’ below. You was given this article by someone who was actually involved in what happened and now is trying to cover himself up and blaming others which is really sad.