FriendFinder Networks, which operates sites including Adult FriendFinder, Cams and MillionaireMate, has been hit with a massive hack, according to breach tracking site Leaked Source.
While the most common accounts included in the data dump were from adultfriendfinder and cams, with more than 339 million and 62 million respectively, there were also more than seven million account credentials from penthouse, a domain which the company sold back in February.
Hook-up and dating site Adult FriendFinder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed
Leaked Source also found more than 15 million emails in the database in the format of “”. The site claimed that signing up with an email in this format is impossible, saying that the ” suffix was added by FriendFinder Networks.
“We’ve seen this situation many times before and it likely means these were users who tried to delete their account[s],” Leaked Source said. “The data is obviously still kept around because, you know, we’re looking at it.”
A total of at least 125 million passwords were stored in plaintext. Even those that were encrypted were hashed with SHA1, an encryption method that major vendors have discontinued due to the ease with which it can be cracked.
The existence of a Local File Inclusion (LFI) vulnerability in FriendFinder Networks’ database was brought to the attention of the company last month by a security researcher known on Twitter as 1×0123 (now real1x0123).
In a statement, the company did not elaborate on the nature of the vulnerability but confirmed it has opened a security investigation.
“Over the past several weeks, we have received a number of reports regarding potential security vulnerabilities from a variety of sources,” FriendFinder Networks said in its statement, emailed to IT Pro. “Immediately upon learning this information, we took several steps to review the situation and bring in the right external partners to support our investigation. Our investigation is ongoing but we will continue to ensure all potential and substantiated reports of vulnerabilities are reviewed and if validated, remediated as quickly as possible.”
It added: “FriendFinder takes the security of its customer information seriously and is in the process of notifying affected users to provide them with information and guidance on how they can protect themselves. We will provide further updates as our investigation continues.”
The suggestion of a security flaw first came from self-styled “underground researcher” 1×0123 on Tuesday night, who posted on Twitter a screen grab that suggested Adult FriendFinder has a Local File Inclusion (LFI) vulnerability.
IT Proapproached FriendFinder Networks to ask if and how the breach occurred, and for comment on Leaked Source’s claims
Later he or she tweeted: “No reply from#adulfriendfinder.. time to get some sleep they will call it hoax again and i will f**king leak everything”.
While there is currently no suggestion of a public data leak, the situation could prove very serious for the company if it is real; a leak would expose vulnerable data that is both highly personal and potentially embarassing.
Diana Lynn Ballou, FriendFinder Networks’ VP and senior counsel of corporate compliance and litigation, emailedIT Proa statement that read: “We are aware of reports of a security incident, and we are currently investigating to determine the validity of the reports. If we confirm that a security incident did occur, we will work to address any issues and notify any customers that may be affected.”
The scenario is highly reminiscent of the Ashley Madison hack last year. During that data breach, the details of around 37 million users worldwide were compromised, with a number of people’s usernames, login details and other credentials posted online.
- chief information security officer (CISO)