IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

AdultFriendFinder hack 'exposes 412 million users'

Account details were reportedly stored in plaintext

A hook-up and dating site company has allegedly been hacked, exposing over 412 million user accounts.

FriendFinder Networks, which operates sites including Adult FriendFinder, Cams.com and MillionaireMate, has been hit with a massive hack, according to breach tracking site Leaked Source.

While the most common accounts included in the data dump were from adultfriendfinder.com and cams.com, with more than 339 million and 62 million respectively, there were also more than seven million account credentials from penthouse.com, a domain which the company sold back in February.

Leaked Source also found more than 15 million emails in the database in the format of "email@address.com@deleted1.com". The site claimed that signing up with an email in this format is impossible, saying that the '@deleted' suffix was added by FriendFinder Networks.

"We've seen this situation many times before and it likely means these were users who tried to delete their account[s]," Leaked Source said. "The data is obviously still kept around because, you know, we're looking at it."

A total of at least 125 million passwords were stored in plaintext. Even those that were encrypted were hashed with SHA1, an encryption method that major vendors have discontinued due to the ease with which it can be cracked.

The existence of a Local File Inclusion (LFI) vulnerability in FriendFinder Networks' database was brought to the attention of the company last month by a security researcher known on Twitter as 1x0123 (now real1x0123).

They told IT Pro today that the attackers used this same security flaw to infiltrate the company.

IT Proapproached FriendFinder Networks to ask if and how the breach occurred, and for comment on Leaked Source's claims. In a statement, the company did not elaborate on the nature of the vulnerability but confirmed it has opened a security investigation.

"Over the past several weeks, we have received a number of reports regarding potential security vulnerabilities from a variety of sources," FriendFinder Networks said in its statement, emailed to IT Pro. "Immediately upon learning this information, we took several steps to review the situation and bring in the right external partners to support our investigation. Our investigation is ongoing but we will continue to ensure all potential and substantiated reports of vulnerabilities are reviewed and if validated, remediated as quickly as possible."

It added: "FriendFinder takes the security of its customer information seriously and is in the process of notifying affected users to provide them with information and guidance on how they can protect themselves. We will provide further updates as our investigation continues."

Picture credit: Bigstock

This story was originally published at 12.33pm on 14 November. It was updated at 5.24pm later that day with Friend Finder Networks' statement.

19/10/2016:Adult FriendFinder 'has a serious security flaw'

Hook-up and dating site Adult FriendFinder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.

The suggestion of a security flaw first came from self-styled "underground researcher" 1x0123 on Tuesday night, who posted on Twitter a screen grab that suggested Adult FriendFinder has a Local File Inclusion (LFI) vulnerability.

Researcher 1x0123 wrote: "F**kload of databases with same user/password + runing as root".

Later he or she tweeted: "No reply from#adulfriendfinder.. time to get some sleep they will call it hoax again and i will f**king leak everything".

While there is currently no suggestion of a public data leak, the situation could prove very serious for the company if it is real; a leak would expose vulnerable data that is both highly personal and potentially embarassing.

Diana Lynn Ballou, FriendFinder Networks' VP and senior counsel of corporate compliance and litigation, emailedIT Proa statement that read: "We are aware of reports of a security incident, and we are currently investigating to determine the validity of the reports. If we confirm that a security incident did occur, we will work to address any issues and notify any customers that may be affected."

The scenario is highly reminiscent of the Ashley Madison hack last year. During that data breach, the details of around 37 million users worldwide were compromised, with a number of people's usernames, login details and other credentials posted online.

This article was originally published on 19 October at 10.26am, and updated at 16.06pm to include FriendFinder's statement.

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
The top programming languages you need to learn for 2022
Careers & training

The top programming languages you need to learn for 2022

23 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022