AdultFriendFinder hack 'exposes 412 million users'

Account details were reportedly stored in plaintext

A hook-up and dating site company has allegedly been hacked, exposing over 412 million user accounts.

FriendFinder Networks, which operates sites including Adult FriendFinder, Cams.com and MillionaireMate, has been hit with a massive hack, according to breach tracking site Leaked Source.

While the most common accounts included in the data dump were from adultfriendfinder.com and cams.com, with more than 339 million and 62 million respectively, there were also more than seven million account credentials from penthouse.com, a domain which the company sold back in February.

Leaked Source also found more than 15 million emails in the database in the format of "email@address.com@deleted1.com". The site claimed that signing up with an email in this format is impossible, saying that the '@deleted' suffix was added by FriendFinder Networks.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"We've seen this situation many times before and it likely means these were users who tried to delete their account[s]," Leaked Source said. "The data is obviously still kept around because, you know, we're looking at it."

A total of at least 125 million passwords were stored in plaintext. Even those that were encrypted were hashed with SHA1, an encryption method that major vendors have discontinued due to the ease with which it can be cracked.

The existence of a Local File Inclusion (LFI) vulnerability in FriendFinder Networks' database was brought to the attention of the company last month by a security researcher known on Twitter as 1x0123 (now real1x0123).

They told IT Pro today that the attackers used this same security flaw to infiltrate the company.

IT Proapproached FriendFinder Networks to ask if and how the breach occurred, and for comment on Leaked Source's claims. In a statement, the company did not elaborate on the nature of the vulnerability but confirmed it has opened a security investigation.

"Over the past several weeks, we have received a number of reports regarding potential security vulnerabilities from a variety of sources," FriendFinder Networks said in its statement, emailed to IT Pro. "Immediately upon learning this information, we took several steps to review the situation and bring in the right external partners to support our investigation. Our investigation is ongoing but we will continue to ensure all potential and substantiated reports of vulnerabilities are reviewed and if validated, remediated as quickly as possible."

Advertisement - Article continues below

It added: "FriendFinder takes the security of its customer information seriously and is in the process of notifying affected users to provide them with information and guidance on how they can protect themselves. We will provide further updates as our investigation continues."

Picture credit: Bigstock

This story was originally published at 12.33pm on 14 November. It was updated at 5.24pm later that day with Friend Finder Networks' statement.

19/10/2016:Adult FriendFinder 'has a serious security flaw'

Advertisement
Advertisement - Article continues below

Hook-up and dating site Adult FriendFinder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.

The suggestion of a security flaw first came from self-styled "underground researcher" 1x0123 on Tuesday night, who posted on Twitter a screen grab that suggested Adult FriendFinder has a Local File Inclusion (LFI) vulnerability.

Advertisement - Article continues below

Researcher 1x0123 wrote: "F**kload of databases with same user/password + runing as root".

Later he or she tweeted: "No reply from#adulfriendfinder.. time to get some sleep they will call it hoax again and i will f**king leak everything".

While there is currently no suggestion of a public data leak, the situation could prove very serious for the company if it is real; a leak would expose vulnerable data that is both highly personal and potentially embarassing.

Diana Lynn Ballou, FriendFinder Networks' VP and senior counsel of corporate compliance and litigation, emailedIT Proa statement that read: "We are aware of reports of a security incident, and we are currently investigating to determine the validity of the reports. If we confirm that a security incident did occur, we will work to address any issues and notify any customers that may be affected."

The scenario is highly reminiscent of the Ashley Madison hack last year. During that data breach, the details of around 37 million users worldwide were compromised, with a number of people's usernames, login details and other credentials posted online.

This article was originally published on 19 October at 10.26am, and updated at 16.06pm to include FriendFinder's statement.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020