412 million FriendFinder records exposed by code hackers

412 million FriendFinder records exposed by code hackers

Hacked records connected to AdultFriendFinder.com, Cams.com, iCams.com, Stripshow.com, and Penthouse.com

Six databases from FriendFinder Networks Inc., the organization behind a number of the world’s biggest adult-oriented social web sites, have now been circulating online because they had been compromised in October.

LeakedSource, a breach notification internet site, disclosed the event completely on and said the six compromised databases exposed 412,214,295 accounts, with the bulk of them coming from AdultFriendFinder.com sunday

When expected straight in regards to the problem, 1×0123, that is also understood in a few groups by the title Revolver, stated the LFI had been found in a module on AdultFriendFinder’s production servers.

Maybe Not very long after he disclosed the LFI, Revolver reported on Twitter the presssing issue ended up being fixed, and “. no consumer information ever left their web site.”

Their account on Twitter has since been suspended, but at that time he made those remarks, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them as a result to follow-up questions regarding the event.

On October 20, 2016, Salted Hash had been the first to ever report FriendFinder Networks had most likely been compromised despite Revolver’s claims, exposing a lot more than 100 million reports.

As well as the leaked databases, the presence of supply code from FriendFinder Networks’ production environment, aswell as leaked public / private key-pairs, further put into the mounting proof the corporation https://www.hookupdates.net/fdating-review had experienced a severe information breach.

FriendFinder Networks never offered any extra statements regarding the matter, even with the excess documents and supply rule became knowledge that is public.

As stated, previous estimates put the FriendFinder Networks information breach at more than 100 million records.

These estimates that are early in line with the measurements of this databases being prepared by LeakedSource, in addition to offers being created by other people online claiming to obtain 20 million to 70 million FriendFinder records – a lot of them originating from AdultFriendFinder.com.

The overriding point is, these documents occur in numerous places online. They may be being offered or shared with anybody who could have a pursuit inside them.

On Sunday, LeakedSource reported the last count had been 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in might.

This data breach additionally marks the time that is second users have experienced their username and passwords compromised; the very first time being in might of 2015, which impacted 3.5 million individuals.

The figures disclosed by LeakedSource on include sunday:

    339,774,493 records that are compromised AdultFriendFinder.com

62,668,630 records that are compromised Cams.com

7,176,877 compromised documents form Penthouse.com

1,135,731 records that are compromised iCams.com

1,423,192 records that are compromised Stripshow.com

  • 35,372 compromised documents from an unknown domain
  • All the databases have usernames, e-mail details and passwords, that have been saved as simple text, or hashed utilizing SHA1 with pepper. It really isn’t clear why variations that are such.

    “Neither technique is considered safe by any stretch associated with imagination and in addition, the hashed passwords appear to have been changed to any or all lowercase before storage space which made them in an easier way to attack but means the qualifications will soon be somewhat less ideal for harmful hackers to abuse into the world that is real” LeakedSource said, talking about the password storage space choices.

    In every, 99-percent associated with the passwords into the FriendFinder Networks databases have now been cracked. By way of scripting that is easy the lowercase passwords aren’t likely to hinder many attackers who’re trying to make use of recycled qualifications.

    In addition, a number of the documents when you look at the leaked databases have actually an” that is“rm the username, which may suggest an elimination marker, but unless FriendFinder verifies this, there’s no chance to ensure.

    Another interest into the information centers on reports with a contact address of email@address.com@deleted1.com.

    Once again, this may suggest the account ended up being marked for deletion, however if therefore, why ended up being the record completely intact? Exactly the same might be expected for the accounts with “rm_” within the username.

    More over, in addition it is not clear why the business has documents for Penthouse.com, a residential property FriendFinder Networks offered early in the day this 12 months to Penthouse worldwide Media Inc.

    Salted Hash reached away to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements also to ask extra concerns. This article was written however, neither company had responded by the time. (See update below.)

    Salted Hash additionally reached off to a few of the users with present login documents.

    These users had been element of an example listing of 12,000 documents provided to the news. Not one of them reacted before this informative article went along to print. During the exact same time, tries to start records because of the leaked email failed, since the target had been into the system.

    As things stay, it appears to be as though FriendFinder Networks Inc. is completely compromised. Hundreds of millions of users from all over the planet have experienced their reports exposed, making them available to Phishing, and on occasion even even even worse, extortion.

    That is particularly detrimental to the 78,301 individuals who utilized a .mil current email address, or the 5,650 those who utilized a .gov current email address, to join up their FriendFinder Networks account.

    Regarding the upside, LeakedSource just disclosed the scope that is full of information breach. For the time being, usage of the information is bound, and it also will never be readily available for general public queries.

    For anybody wondering if their AdultFriendFinder.com or Cams.com account happens to be compromised, LeakedSource claims it is far better simply assume this has.

    “If anybody registered a free account just before of 2016 on any Friend Finder website, they should assume they are impacted and prepare for the worst,” LeakedSource said in a statement to Salted Hash november.

    On their site, FriendFinder Networks claims they do have more than 700,000,000 total users, distribute across 49,000 internet sites within their system – gaining 180,000 registrants daily.


    FriendFinder has given a significantly general public advisory about the information breach, but none of this affected web sites have now been updated to mirror the notice. As a result, users registering on AdultFriendFinder.com wouldn’t have a clue that the organization has experienced a huge safety event, unless they’ve been technology news that is following.

    Based on the declaration published on PRNewswire, FriendFinder Networks will begin notifying affected users about the information breach. But, it really isn’t clear when they shall alert some or all 412 million records which have been compromised. The business still hasn’t taken care of immediately concerns delivered by Salted Hash.

    “Based from the ongoing research, FFN is not in a position to figure out the precise amount of compromised information. Nevertheless, because FFN values its relationship with customers and provides really the security of client information, FFN is within the means of notifying impacted users to give these with information and help with the way they can protect on their own,” the statement stated in component.

    In addition, FriendFinder Networks has employed some other company to help its investigation, but this firm wasn’t known as straight. For the time being, FriendFinder Networks is urging all users to reset their passwords.

    In an appealing development, the pr release ended up being authored by Edelman, a company known for Crisis PR. Just before Monday, all press needs at FriendFinder Networks were managed by Diana Lynn Ballou, and this seems to be a change that is recent.

    Steve Ragan is senior staff journalist at CSO. ahead of joining the journalism globe in 2005, Steve invested 15 years being a freelance IT specialist dedicated to infrastructure management and safety.