412 million FriendFinder records exposed by hackers

412 million FriendFinder records exposed by hackers

Hacked records connected to AdultFriendFinder.com, Cams.com, iCams.com, Stripshow.com, and Penthouse.com

Six databases from FriendFinder Networks Inc., the business behind a few of the world’s biggest adult-oriented websites that are social have already been circulating online simply because they had been compromised in October.

LeakedSource, a breach notification website, disclosed the event fully on and said the six compromised databases exposed 412,214,295 accounts, with the bulk of them coming from AdultFriendFinder.com sunday

When expected straight concerning the presssing issue, 1×0123, that is also understood in a few groups because of the title Revolver, said the LFI ended up being found in a module on AdultFriendFinder’s production servers.

Maybe Not very long after he disclosed the LFI, Revolver claimed on Twitter the presssing issue had been remedied, and “. no consumer information ever left their web site.”

Their account on Twitter has since been suspended, but during the time he made those feedback, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them as a result to questions that are follow-up the event.

On October 20, 2016, Salted Hash had been the first to ever report FriendFinder Networks had most likely been compromised despite Revolver’s claims, exposing significantly more than 100 million reports.

As well as the leaked databases, the presence of supply rule from FriendFinder Networks’ manufacturing environment, aswell as leaked public / private key-pairs, further put into the mounting proof the company had experienced a severe information breach.

FriendFinder Networks never offered any extra statements in the matter, even with the extra documents and supply rule became knowledge that is public.

As previously mentioned, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports.

These very early quotes had been on the basis of the measurements regarding the databases being prepared by LeakedSource, along with provides being created by other people online claiming to obtain 20 million to 70 million FriendFinder documents – a lot of them originating from AdultFriendFinder.com.

The main point is, these documents occur in numerous places online. They truly are being offered or shared with anybody who could have a pursuit inside them.

On Sunday, LeakedSource reported the count that is final 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in might.

This information breach additionally marks the time that is second users have experienced their username and passwords compromised; the very first time being in might of 2015, which impacted 3.5 million individuals.

The numbers disclosed by LeakedSource on Sunday include:

    339,774,493 compromised documents from AdultFriendFinder.com

62,668,630 compromised documents from Cams.com

7,176,877 records that are compromised Penthouse.com

1,135,731 records that are compromised iCams.com

1,423,192 records that are compromised Stripshow.com

  • 35,372 compromised documents from a domain that is unknown
  • Every one of the databases have usernames, e-mail details and passwords, that have been saved as simple text, or hashed utilizing SHA1 with pepper. It really isn’t clear why such variants occur.

    “Neither technique is regarded as safe by any stretch for the imagination and moreover, the hashed passwords appear to have been changed to all lowercase before storage space which made them in an easier way to strike but means the qualifications are going to be somewhat less helpful for harmful hackers to abuse within the real life,” LeakedSource said, talking about the password storage space options.

    In most, 99-percent of this passwords within the FriendFinder Networks databases have already been cracked. As a result of easy scripting, the lowercase passwords aren’t planning to hinder many attackers who will be seeking to make the most of recycled qualifications.

    In addition, a few of the documents into the leaked databases have actually an” that is“rm the username, that could suggest a treatment marker, but unless FriendFinder verifies this, there’s no chance to be sure.

    Another interest within the information centers on reports with a contact target of email@address.com@deleted1.com.

    Once more, this can mean http://hookupdates.net/daddyhunt-review the account was marked for removal, however, if therefore, why had been the record completely intact? The exact same might be expected for the accounts with “rm_” included in the username.

    More over, in addition is not clear why the ongoing company has records for Penthouse.com, a house FriendFinder Networks offered previously this to Penthouse Global Media Inc year.

    Salted Hash reached out to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements and also to ask extra concerns. Because of the time this short article had been written nevertheless, neither company had answered. (See update below.)

    Salted Hash also reached down to a number of the users with present login documents.

    These users had been element of an example selection of 12,000 documents provided to the news. Not one of them responded before this informative article visited printing. During the time that is same tries to start reports using the leaked current email address failed, since the target had been into the system.

    As things stay, it appears as though FriendFinder Networks Inc. happens to be completely compromised. Billions of users from all over the world experienced their reports exposed, making them available to Phishing, as well as worse, extortion.

    This is certainly particularly harmful to the 78,301 those who utilized a .mil email, or the 5,650 those who utilized a .gov current email address, to join up their FriendFinder Networks account.

    From the upside, LeakedSource only disclosed the scope that is full of information breach. For the present time, use of the info is bound, plus it will never be designed for general public queries.

    For anybody wondering if their AdultFriendFinder.com or Cams.com account happens to be compromised, LeakedSource claims it is better to just assume it offers.

    “If anybody registered a merchant account prior to November of 2016 on any Friend Finder internet site, they need to assume they truly are affected and get ready for the worst,” LeakedSource said in a declaration to Salted Hash.

    On their site, FriendFinder Networks claims they do have more than 700,000,000 total users, spread across 49,000 internet sites inside their system – gaining 180,000 registrants daily.

    Up-date:

    FriendFinder has granted an advisory that is somewhat public the information breach, but none regarding the affected sites have already been updated to mirror the notice. As a result, users registering on AdultFriendFinder.com wouldn’t have an idea that the organization has experienced an enormous safety event, unless they’ve been technology news that is following.

    In accordance with the statement posted on PRNewswire, FriendFinder Networks will begin notifying users that are affected the information breach. But, it’sn’t clear when they shall inform some or all 412 million records which have been compromised. The organization nevertheless hasn’t taken care of immediately questions sent by Salted Hash.

    “Based regarding the investigation that is ongoing FFN is not in a position to figure out the actual number of compromised information. Nevertheless, because FFN values customers and takes to its relationship seriously the security of client information, FFN is within the means of notifying impacted users to supply all of them with information and help with the way they can protect by themselves,” the declaration stated to some extent.

    In addition, FriendFinder Networks has employed a firm that is outside help its research, but this company wasn’t called straight. For the time being, FriendFinder Networks is urging all users to reset their passwords.

    In a fascinating development, the news release ended up being authored by Edelman, a company recognized for Crisis PR. Just before Monday, all press demands at FriendFinder Networks were managed by Diana Lynn Ballou, and this seems to be a present modification.

    Steve Ragan is senior staff journalist at CSO. just before joining the journalism globe in 2005, Steve invested fifteen years as being a freelance IT contractor dedicated to infrastructure administration and safety.


    Fatal error: Uncaught Error: Call to undefined function WP_Optimize() in H:\root\home\ryanceasar07-002\www\WP003\wp-content\plugins\wp-optimize\cache\file-based-page-cache-functions.php:170 Stack trace: #0 [internal function]: wpo_cache('<!DOCTYPE html>...', 9) #1 H:\root\home\ryanceasar07-002\www\WP003\wp-includes\functions.php(4755): ob_end_flush() #2 H:\root\home\ryanceasar07-002\www\WP003\wp-includes\class-wp-hook.php(287): wp_ob_end_flush_all('') #3 H:\root\home\ryanceasar07-002\www\WP003\wp-includes\class-wp-hook.php(311): WP_Hook->apply_filters('', Array) #4 H:\root\home\ryanceasar07-002\www\WP003\wp-includes\plugin.php(484): WP_Hook->do_action(Array) #5 H:\root\home\ryanceasar07-002\www\WP003\wp-includes\load.php(1052): do_action('shutdown') #6 [internal function]: shutdown_action_hook() #7 {main} thrown in H:\root\home\ryanceasar07-002\www\WP003\wp-content\plugins\wp-optimize\cache\file-based-page-cache-functions.php on line 170