19th Ave New York, NY 95822, USA

As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million records

As stated, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million records

Hacked reports connected to AdultFriendFinder.com, Cams.com, iCams.com, Stripshow.com, and Penthouse.com

Six databases from FriendFinder Networks Inc., the business behind a number of the world’s biggest adult-oriented social web sites, have now been circulating online given that they had been compromised in October.

LeakedSource, a breach notification site, disclosed the event completely on and said the six compromised databases exposed 412,214,295 accounts, with the bulk of them coming from AdultFriendFinder.com sunday

It’s thought the incident occurred ahead of October 20, 2016, as timestamps on some records suggest a last login of october 17. This schedule can also be significantly verified by the way the FriendFinder Networks episode played down.

On 18, 2016, a researcher who goes by the handle 1×0123 on Twitter, warned Adult FriendFinder about Local File Inclusion (LFI) vulnerabilities on their website, and posted screenshots as proof october.

When asked directly in regards to the presssing problem, 1×0123, that is additionally understood in certain sectors because of the title Revolver, stated the LFI had been found in a module on AdultFriendFinder’s production servers.

Maybe maybe Not even after he disclosed the LFI, Revolver reported on Twitter the issue had been solved, and “. no consumer information ever left their site.”

Their account on Twitter has since been suspended, but during the time he made those responses, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them in reaction to follow-up questions regarding the event.

On October 20, 2016, Salted Hash had been the first to ever report FriendFinder Networks had most likely been compromised despite Revolver’s claims, exposing a lot more than 100 million records.

The existence of source code from FriendFinder Networks’ production environment, as well as leaked public / private key-pairs, further added to the mounting evidence the organization had suffered a severe data breach in addition to the leaked databases.

FriendFinder Networks never offered any additional statements in the matter, even with the excess documents and supply rule became knowledge that is public.

These estimates that are early on the basis of the measurements regarding the databases being prepared by LeakedSource, in addition to provides being created by others online claiming to obtain 20 million to 70 million FriendFinder documents – a lot of them originating from AdultFriendFinder.com.

The main point is, these documents occur in numerous places online. They truly are being shared or sold with anybody who may have a pursuit inside them.

On Sunday, LeakedSource reported the last count had been 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in might.

This information breach additionally marks the second time FriendFinder users have experienced their username and passwords compromised; the very first time being in might of 2015, which impacted 3.5 million individuals.

The numbers disclosed by LeakedSource on include sunday:

    339,774,493 records that are compromised AdultFriendFinder.com

62,668,630 compromised documents from Cams.com

7,176,877 records that are compromised Penthouse.com

1,135,731 compromised records from iCams.com

1,423,192 compromised documents from Stripshow.com

  • 35,372 compromised documents from a domain that is unknown
  • Most of the databases have usernames, e-mail details and passwords, that have been saved as ordinary text, or hashed SHA1 that is using with. It really isn’t clear why such variants occur.

    “Neither technique is considered protected by any stretch regarding the imagination and moreover, the hashed passwords appear to have been changed to any or all lowercase before storage which made them much easier to strike but means the qualifications would be somewhat less helpful for harmful hackers to abuse into the real life,” LeakedSource said, talking about the password storage space choices.

    In every, 99-percent associated with the passwords within the FriendFinder Networks databases have already been cracked. By way of scripting that is easy the lowercase passwords aren’t likely to hinder many attackers who will be seeking to benefit from recycled qualifications.

    In addition, a few of the records within the leaked databases have actually an “rm_” before the username, which may indicate a elimination marker, but unless FriendFinder verifies this, there’s not a way to be sure.

    Another interest into the information centers on records with a message target of email@address.com@deleted1.com.

    Once more, this may suggest the account had been marked for removal, however, if therefore, why had been the record completely intact? The exact same might be expected when it comes to accounts with “rm_” included in the username.

    Furthermore, it is not clear why the ongoing business has documents for Penthouse.com, a residential property FriendFinder Networks offered previously this to Penthouse Global Media Inc year.

    Salted Hash reached away to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements also to ask extra concerns. This article was written however, neither company had responded by the time. (See update below.)

    Salted Hash additionally reached away to a number of the users with present login documents.

    These users had been element of an example set of 12,000 documents directed at the news. Not one of them reacted before this short article decided to go to printing. At the exact same time, tries to start records because of the leaked current email address failed, because the address had been within the system.

    As things stay, it appears as though FriendFinder Networks Inc. happens to be completely compromised. Vast sums of users from all over the world have experienced their reports exposed, making them available to Phishing, if not even worse, extortion.

    It is specially detrimental to the 78,301 those who utilized a .mil current email address, or perhaps the 5,650 individuals who used a .gov current email address, to join up their FriendFinder Networks account.

    From the upside, LeakedSource just disclosed the complete range for the information iamnaughty cancellation code breach. For the time being, use of the information is bound, and it also will never be readily available for public queries.

    For anybody wondering if their AdultFriendFinder.com or Cams.com account happens to be compromised, LeakedSource says it is far better simply assume it offers.

    “If anybody registered a merchant account ahead of November of 2016 on any Friend Finder web site, they need to assume these are typically affected and get ready for the worst,” LeakedSource said in a declaration to Salted Hash.

    On their site, FriendFinder Networks claims they do have more than 700,000,000 users that are total distribute across 49,000 internet sites within their system – gaining 180,000 registrants daily.


    FriendFinder has released an advisory that is somewhat public the information breach, but none regarding the impacted internet sites have now been updated to mirror the notice. As a result, users registering on AdultFriendFinder.com wouldn’t have an idea that the business has experienced an enormous safety event, unless they’ve been technology news that is following.

    In line with the declaration posted on PRNewswire, FriendFinder Networks will begin notifying users that are affected the information breach. Nevertheless, it’sn’t clear should they will inform some or all 412 million reports which were compromised. The organization nevertheless hasn’t taken care of immediately concerns delivered by Salted Hash.

    “Based regarding the investigation that is ongoing FFN is not in a position to figure out the precise amount of compromised information. But, because FFN values its relationship with customers and provides seriously the security of client information, FFN is within the means of notifying impacted users to offer these with information and help with the way they can protect on their own,” the statement stated to some extent.

    In addition, FriendFinder Networks has employed some other company to support its research, but this company wasn’t known as straight. For the present time, FriendFinder Networks is urging all users to reset their passwords.

    The press release was authored by Edelman, a firm known for Crisis PR in an interesting development. Ahead of Monday, all press needs at FriendFinder Networks had been managed by Diana Lynn Ballou, and this is apparently a present modification.

    Steve Ragan is senior staff writer at CSO. ahead of joining the journalism world in 2005, Steve invested 15 years as a freelance IT specialist centered on infrastructure administration and safety.