As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports

Home / Blog / As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports

November 21, 2020 benaughty adult dating

As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports

As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million reports

Hacked reports connected to,,,, and

Six databases from FriendFinder Networks Inc., the organization behind a number of the world’s biggest adult-oriented websites that are social have now been circulating online because they had been compromised in October.

LeakedSource, a breach notification site, disclosed the event completely on and said the six compromised databases exposed 412,214,295 accounts, with the bulk of them coming from sunday

It’s thought the incident occurred ahead of October 20, 2016, as timestamps on some documents suggest a login that is last of 17. This schedule can also be significantly verified by the way the FriendFinder Networks episode played away.

On 18, 2016, a researcher who goes by the handle 1x0123 on Twitter, warned Adult FriendFinder about Local File Inclusion (LFI) vulnerabilities on their website, and posted screenshots as proof october.

When asked straight in regards to the problem, 1x0123, that is additionally understood in some circles by the title Revolver, stated the LFI had been discovered in a module on AdultFriendFinder’s production servers.

Maybe maybe Not very long after he disclosed the LFI, Revolver claimed on Twitter the presssing issue had been fixed, and “. no consumer information ever left their web site.”

Their account on Twitter has since been suspended, but during the time he made those remarks, Diana Lynn Ballou, FriendFinder Networks' VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them in reaction to follow-up questions regarding the event.

On 20, 2016, Salted Hash was the first to report FriendFinder Networks had likely been compromised despite Revolver’s claims, exposing more than 100 million accounts october.

As well as the leaked databases, the presence of supply rule from FriendFinder Networks' manufacturing environment, aswell as leaked public / private key-pairs, further put into the mounting proof the company had experienced a severe information breach.

FriendFinder Networks never offered any extra statements in the matter, even with the excess documents and supply rule became knowledge that is public.

These very early quotes had been on the basis of the measurements associated with the databases being prepared by LeakedSource, along with provides being created by other people online claiming to own 20 million to 70 million FriendFinder records - many of them originating from

The overriding point is, these records occur in numerous places online. They are being shared or sold with anybody who may have a pursuit inside them.

On Sunday, LeakedSource reported the count that is final 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in May.

This information breach also marks the 2nd time FriendFinder users have experienced their username and passwords compromised; the 1st time being in might of 2015, which impacted 3.5 million individuals.

The numbers disclosed by LeakedSource on Sunday include:

    339,774,493 records that are compromised

62,668,630 compromised documents from 7,176,877 compromised documents form

1,135,731 records that are compromised

1,423,192 compromised documents from

  • 35,372 compromised documents from an unknown domain
  • Most of the databases have usernames, e-mail details and passwords, that have been kept as simple text, or hashed SHA1 that is using with. It really isn’t clear why such variants occur.

    “Neither technique is regarded as protected by any stretch associated with imagination and moreover, the hashed passwords appear to have been changed to any or all lowercase before storage space which made them much easier to strike but means the qualifications is supposed to be somewhat less helpful for harmful hackers to abuse within the world that is real” LeakedSource said, speaking about the password storage space options.

    In most, 99-percent associated with the passwords into the FriendFinder Networks databases have now been cracked. By way of scripting that is easy the lowercase passwords aren’t planning to hinder many attackers who will be trying to make the most of recycled credentials.

    In addition, a number of the documents when you look at the leaked databases have actually an” that is“rm the username, that could suggest a reduction marker, but unless FriendFinder verifies this, there’s no chance to ensure.

    Another fascination within the information centers on records with a message target of

    Once again, this might suggest the account had been marked for removal, however if therefore, why had been the record completely intact? The exact same might be asked for the accounts with "rm_" included in the username.

    Furthermore, in addition it is not clear why the ongoing business has documents for, a house FriendFinder Networks offered early in the day this to Penthouse Global Media Inc year.

    Salted Hash reached off to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements also to ask extra concerns. Because of the time this short article had been written nevertheless, neither business had answered. (See update below.)

    Salted Hash additionally reached down to a few of the users with present login documents.

    These users had been element of an example selection of 12,000 documents provided to the news. Not one of them responded before this short article visited printing. During the time that is same tries to start records with all the leaked current email address failed, due to the fact address had been within the system.

    As things stay, it appears just as if FriendFinder Networks Inc. was completely compromised. Hundreds of millions of users from all over the planet experienced their accounts exposed, making them available to Phishing, and on occasion even even even worse, extortion.

    This might be specially detrimental to the 78,301 those who utilized a .mil current email address, or even the 5,650 those who utilized a .gov email, to join up their FriendFinder Networks account.

    Regarding the upside, LeakedSource just disclosed the complete range regarding the information breach. For the present time, usage of the information is bound, and it also will never be readily available for general general public queries.

    For anybody wondering if their or account happens to be compromised, LeakedSource claims it is far better simply assume it offers.

    “If anybody registered a merchant account just before November of 2016 on any Friend Finder site, they need to assume they truly are affected and get ready for the worst,” LeakedSource said in a declaration to Salted Hash.

    On their site, FriendFinder Networks says they do have more than 700,000,000 users that are total distribute across 49,000 web sites inside their system - gaining 180,000 registrants daily.


    FriendFinder has granted an advisory that is somewhat public the information breach, but none of this affected sites have already been updated to mirror the notice. As a result, users registering on wouldn’t have an idea that the business has experienced an enormous protection incident, unless they’ve been after technology news.

    Based on the declaration posted on PRNewswire, FriendFinder Networks will begin notifying users that are affected the information breach. Nonetheless, it really isn’t clear should they will alert some or all 412 million records which were compromised. The business continues to haven’t taken care of immediately questions delivered by Salted Hash.

    “Based regarding the ongoing research, FFN is not in a position to figure out the actual amount of compromised information. But, because FFN values its relationship with customers and provides really the security of client information, FFN is within the procedure of notifying impacted users to present all of them with information and assistance with the way they can protect on their own,” the declaration stated in component.

    In addition, FriendFinder Networks has employed a firm that is outside help its research, but this company wasn’t called straight. For the present time, FriendFinder Networks is urging all users to reset their passwords.

    The press release was authored by Edelman, a firm known for Crisis PR in an interesting development. Just before Monday, all press demands at FriendFinder Networks had been managed by Diana Lynn Ballou, which means this is apparently a present modification.

    Steve Ragan is senior staff author at CSO. ahead of joining the journalism world in 2005, Steve invested fifteen years as a freelance IT specialist dedicated to infrastructure administration and protection.


    0 Comentário

    Leave a Reply

    Your email address will not be published. Required fields are marked *