AdultFriendFinder hack 'exposes 412 million users'

Account details were reportedly stored in plaintext

A hook-up and dating site company has allegedly been hacked, exposing over 412 million user accounts.

FriendFinder Networks, which operates sites including Adult FriendFinder, Cams.com and MillionaireMate, has been hit with a massive hack, according to breach tracking site Leaked Source.

While the most common accounts included in the data dump were from adultfriendfinder.com and cams.com, with more than 339 million and 62 million respectively, there were also more than seven million account credentials from penthouse.com, a domain which the company sold back in February.

Leaked Source also found more than 15 million emails in the database in the format of "email@address.com@deleted1.com". The site claimed that signing up with an email in this format is impossible, saying that the '@deleted' suffix was added by FriendFinder Networks.

Advertisement
Advertisement - Article continues below

"We've seen this situation many times before and it likely means these were users who tried to delete their account[s]," Leaked Source said. "The data is obviously still kept around because, you know, we're looking at it."

A total of at least 125 million passwords were stored in plaintext. Even those that were encrypted were hashed with SHA1, an encryption method that major vendors have discontinued due to the ease with which it can be cracked.

The existence of a Local File Inclusion (LFI) vulnerability in FriendFinder Networks' database was brought to the attention of the company last month by a security researcher known on Twitter as 1x0123 (now real1x0123).

They told IT Pro today that the attackers used this same security flaw to infiltrate the company.

IT Proapproached FriendFinder Networks to ask if and how the breach occurred, and for comment on Leaked Source's claims. In a statement, the company did not elaborate on the nature of the vulnerability but confirmed it has opened a security investigation.

"Over the past several weeks, we have received a number of reports regarding potential security vulnerabilities from a variety of sources," FriendFinder Networks said in its statement, emailed to IT Pro. "Immediately upon learning this information, we took several steps to review the situation and bring in the right external partners to support our investigation. Our investigation is ongoing but we will continue to ensure all potential and substantiated reports of vulnerabilities are reviewed and if validated, remediated as quickly as possible."

It added: "FriendFinder takes the security of its customer information seriously and is in the process of notifying affected users to provide them with information and guidance on how they can protect themselves. We will provide further updates as our investigation continues."

Picture credit: Bigstock

This story was originally published at 12.33pm on 14 November. It was updated at 5.24pm later that day with Friend Finder Networks' statement.

19/10/2016:Adult FriendFinder 'has a serious security flaw'

Advertisement
Advertisement - Article continues below

Hook-up and dating site Adult FriendFinder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.

The suggestion of a security flaw first came from self-styled "underground researcher" 1x0123 on Tuesday night, who posted on Twitter a screen grab that suggested Adult FriendFinder has a Local File Inclusion (LFI) vulnerability.

Researcher 1x0123 wrote: "F**kload of databases with same user/password + runing as root".

Later he or she tweeted: "No reply from#adulfriendfinder.. time to get some sleep they will call it hoax again and i will f**king leak everything".

While there is currently no suggestion of a public data leak, the situation could prove very serious for the company if it is real; a leak would expose vulnerable data that is both highly personal and potentially embarassing.

Diana Lynn Ballou, FriendFinder Networks' VP and senior counsel of corporate compliance and litigation, emailedIT Proa statement that read: "We are aware of reports of a security incident, and we are currently investigating to determine the validity of the reports. If we confirm that a security incident did occur, we will work to address any issues and notify any customers that may be affected."

The scenario is highly reminiscent of the Ashley Madison hack last year. During that data breach, the details of around 37 million users worldwide were compromised, with a number of people's usernames, login details and other credentials posted online.

This article was originally published on 19 October at 10.26am, and updated at 16.06pm to include FriendFinder's statement.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019