412 million Friend Finder accounts exposed by code hackers

412 million Friend Finder accounts exposed by code hackers

Hacked records connected to AdultFriendFinder.com, Cams.com, iCams.com, Stripshow.com, and Penthouse.com

Six databases from FriendFinder Networks Inc., the business behind a few of the world’s biggest adult-oriented social sites, happen circulating online simply because they had been compromised in October.

LeakedSource, a breach notification web site, disclosed the event completely on Sunday and stated the six compromised databases exposed 412,214,295 reports, aided by the almost all them originating from AdultFriendFinder.com

It’s thought the incident occurred ahead of October 20, 2016, as timestamps on some documents suggest a login that is last of 17. This schedule can also be significantly verified by the way the FriendFinder Networks episode played away.

On October 18, 2016, a researcher whom goes on the handle 1×0123 on Twitter, warned Adult FriendFinder about Local File Inclusion (LFI) vulnerabilities on their site, and posted screenshots as evidence.

When expected straight concerning the presssing problem, 1×0123, that is additionally understood in a few sectors because of the title Revolver, stated the LFI had been found in a module on AdultFriendFinder’s production servers.

maybe maybe Not very long after he disclosed the LFI, Revolver claimed on Twitter the issue had been settled, and “. no consumer information ever left their site.”

Their account on Twitter has since been suspended, but at that time he made those responses, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them in reaction to follow-up questions regarding the event.

On 20, 2016, Salted Hash was the first to report FriendFinder Networks had likely been compromised despite Revolver’s claims, exposing more than 100 million accounts october.

The existence of source code from FriendFinder Networks’ production environment, as well as leaked public / private key-pairs, further added to the mounting evidence the organization had suffered a severe data breach in addition to the leaked databases.

FriendFinder Networks never offered any extra statements regarding the matter, even with the extra documents and supply rule became general public knowledge.

As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports.

These very early quotes had been on the basis of the measurements associated with databases being prepared by LeakedSource, along with provides being produced by other people online claiming to own 20 million to 70 million FriendFinder documents – a lot of them originating from AdultFriendFinder.com.

The overriding point is, these documents occur in numerous places online. They may be being offered or shared with anybody who could have a pastime inside them.

On Sunday, LeakedSource reported the last count ended up being 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in might.

This information breach additionally marks the 2nd time FriendFinder users have had their username and passwords compromised; the very first time being in might of 2015, which impacted 3.5 million individuals.

The figures disclosed by LeakedSource on Sunday include:

    339,774,493 records that are compromised AdultFriendFinder.com

62,668,630 compromised documents from Cams.com

7,176,877 compromised documents form Penthouse.com

1,135,731 compromised documents from iCams.com

1,423,192 compromised documents from Stripshow.com

  • 35,372 compromised documents from a domain that is unknown
  • Every one of the databases have usernames, e-mail addresses and passwords, that have been saved as ordinary text, or hashed utilizing SHA1 with pepper. It’sn’t clear why variations that are such.

    “Neither technique is considered protected by any stretch for the imagination and in addition, the hashed passwords appear to have been changed to any or all lowercase before storage space which made them in an easier way to attack but means the qualifications will likely to be somewhat less helpful for harmful hackers to abuse within the world that is real” LeakedSource said, talking about the password storage space choices.

    In most, 99-percent of this passwords within the FriendFinder Networks databases have now been cracked. Because of effortless scripting, the lowercase passwords aren’t likely to hinder many attackers who are trying to make use of recycled qualifications.

    In addition, a few of the documents within the leaked databases have actually an” that is“rm the username, that could suggest a reduction marker, but unless FriendFinder verifies this, there’s no chance to be sure.

    Another fascination when you look at the information centers on records with a message target of email@address.com@deleted1.com.

    Once again, this might suggest the account had been marked for removal, however if therefore, why ended up being the record completely intact? The exact same might be expected when it comes to accounts with “rm_” within the username.

    Furthermore, in addition it is not clear why the business has documents for Penthouse.com, a house FriendFinder Networks offered previously this 12 months to Penthouse worldwide Media Inc.

    Salted Hash reached away to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements and also to ask questions that are additional. This article was written however, neither company had responded by the time. (See update below.)

    Salted Hash additionally reached down to a number of the users with current login documents.

    These users had been section of an example a number of 12,000 documents provided to the news. Not one of them reacted before this informative article decided to go to printing. During the exact same time, tries to open reports aided by the leaked current email address failed, due to the fact target had been when you look at the system.

    As things stay, it appears just as if FriendFinder Networks Inc. happens to be completely compromised. Vast sums of users from all over the world have experienced their reports exposed, making them available to Phishing, and sometimes even even even worse, extortion.

    This is certainly particularly detrimental to the 78,301 those who utilized a .mil current email address, or even the 5,650 those who utilized a .gov current email address, to join up their FriendFinder Networks account.

    In the upside, LeakedSource just disclosed the complete range associated with information breach. For the present time, use of the information is bound, plus it shall never be designed for general general general public queries.

    For anybody wondering if their AdultFriendFinder.com or Cams.com account happens to be compromised, LeakedSource claims it is far better simply assume this has.

    “If anybody registered a merchant account ahead of of 2016 on any Friend Finder website, they should assume they are impacted and prepare for the worst,” LeakedSource said in a statement to Salted Hash november.

    On the site, FriendFinder Networks claims they do have more than 700,000,000 total users, spread across 49,000 sites inside their system – gaining 180,000 registrants daily.


    FriendFinder has released a significantly general public advisory about the info breach, but none of this affected sites were updated to mirror the notice. As a result, users registering on AdultFriendFinder.com wouldn’t have an idea that the business has experienced an enormous safety event, unless they’ve been after technology news.

    In line with the declaration posted on PRNewswire, FriendFinder Networks will begin notifying users that are affected the information breach. Nevertheless, it’sn’t clear when they shall inform some or all 412 million records which were compromised. The organization nevertheless hasn’t taken care of immediately concerns delivered by Salted Hash.

    “Based regarding the ongoing research, FFN is not in a position to figure out the actual number of compromised information. Nonetheless, because FFN values customers and takes to its relationship really the security of client information, FFN is within the procedure of notifying impacted users to give all of them with information and assistance with the way they can protect by themselves,” the declaration stated in part.

    In addition, FriendFinder Networks has hired some other company to help its research, but this company wasn’t known as straight. For the time being, FriendFinder Networks is urging all users to reset their passwords.

    In a fascinating development, the news release had been authored by Edelman, a strong known for Crisis PR. Ahead of Monday, all press demands at FriendFinder Networks had been managed by Diana Lynn Ballou, and this is apparently a change that is recent.

    Steve Ragan is senior staff journalist at CSO. just before joining the journalism globe in 2005, Steve invested fifteen years as a freelance IT contractor centered on infrastructure administration and safety.


    Leave a reply

    Ваш адрес email не будет опубликован. Обязательные поля помечены *


    восемьдесят один + = 89

    ©2021 Международный русский консервативный форум | The International Russian Conservative Forum

    Log in with your credentials

    Forgot your details?