Adult friend finder hacked accounts
The Adult Friend Finder and other sister companies are a huge target for hackers.Clearly, it has the burden of handling an abundant amount of sensitive information and it would only make sense for them to have an excellent security measure to keep intruders out.This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Eighteen months after 4 million of its users' accounts were exposed, adult dating and pornography company Friend Finder Networks (FFN) has been hit by another doxing attack -- this one a hundred times larger.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Over 412 million accounts -- including 16 million "deleted" accounts -- were leaked from FFN sites, including Adult Friend Finder.com, Penthouse.com, Stripshow.com, Cams.com, and i Although the size of the breach is far greater, the nature of the data is less intimate than the previous FFN breach.This time, email addresses, passwords, dates of last visits, browser information, IP addresses, and site membership status were revealed, reports The Guardian, citing data breach monitoring service Leaked Source.A security researcher known as Revolver claimed to find a flaw in Friend Finder Networks’ security in October, posting the information to a now-suspended Twitter account and threatening to 'leak everything' should the company call the flaw report a hoax." "This is criminal negligence, as it's not the first time," says Stu Sjouerman, CEO of security awareness training company Know Be4, in a statement.
Wait for a raft of class-action lawsuits." Last July, another pornography and adult hook-up site, Ashley Madison, suffered a doxing attack that exposed 37 million users accounts. Sjouerman says that when Know Be4 sent its customers fake phishing emails with lures related to the Ashley Madison breach, 4% of users clicked. Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events.That security analyst, known as Revolver, denied any participation in the hack. Hackers can use this collision exploit to their advantage.The truth is, hackers can use collision to forge a digital signature and access a user’s account. In fact, there are free resources online that allow you to decrypt SHA-1 Hash.Included in the leak were 96 million Hotmail accounts, 78,301 US military email accounts, and 5,650 US government accounts.From The Guardian: "It is also unclear who perpetrated the hack.
Neither method is considered secure by any stretch of the imagination.'" Among the leaked accounts are some FFN should not necessarily have had to lose in the first place.