Breaking News

As previously mentioned, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million records

As previously mentioned, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million records

Hacked records connected to,,,, and

Six databases from FriendFinder Networks Inc., the business behind a number of the world’s biggest adult-oriented social internet sites, have already been circulating online given that they had been compromised in October.

LeakedSource, a breach notification site, disclosed the event completely on and said the six compromised databases exposed 412,214,295 accounts, with the bulk of them coming from sunday

It’s thought the incident happened ahead of October 20, 2016, as timestamps on some documents suggest a login that is last of 17. This schedule normally significantly confirmed by benaughty the way the FriendFinder Networks episode played down.

On October 18, 2016, a researcher whom passes the handle 1×0123 on Twitter, warned Adult FriendFinder about Local File Inclusion (LFI) vulnerabilities on the site, and posted screenshots as evidence.

When asked straight concerning the presssing problem, 1×0123, that is additionally understood in a few groups because of the name Revolver, stated the LFI ended up being found in a module on AdultFriendFinder’s production servers.

maybe Not even after he disclosed the LFI, Revolver reported on Twitter the issue had been solved, and “. no consumer information ever left their site.”

Their account on Twitter has since been suspended, but during the time he made those feedback, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash in their mind as a result to questions that are follow-up the event.

On October 20, 2016, Salted Hash ended up being the first to ever report FriendFinder Networks had most likely been compromised despite Revolver’s claims, exposing significantly more than 100 million records.

Aside from the leaked databases, the presence of supply rule from FriendFinder Networks’ production environment, aswell as leaked public / private key-pairs, further put into the mounting proof the business had experienced a severe information breach.

FriendFinder Networks never offered any extra statements regarding the matter, even with the extra documents and supply rule became knowledge that is public.

These estimates that are early on the basis of the measurements associated with the databases being prepared by LeakedSource, along with provides being produced by other people online claiming to possess 20 million to 70 million FriendFinder documents – a lot of them originating from

The overriding point is, these documents exist in numerous places online. They truly are being shared or sold with anybody who may have a pastime inside them.

On Sunday, LeakedSource reported the count that is final 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million records from MySpace in might.

This information breach also marks the time that is second users have experienced their username and passwords compromised; the very first time being in might of 2015, which impacted 3.5 million individuals.

The numbers disclosed by LeakedSource on include sunday:

    339,774,493 compromised records from

62,668,630 compromised documents from

7,176,877 compromised documents form

1,135,731 records that are compromised

1,423,192 records that are compromised

  • 35,372 compromised documents from an unknown domain
  • Most of the databases contain usernames, e-mail details and passwords, that have been saved as ordinary text, or hashed utilizing SHA1 with pepper. It isn’t clear why such variants occur.

    “Neither technique is regarded as protected by any stretch regarding the imagination and moreover, the hashed passwords appear to have been changed to any or all lowercase before storage space which made them much easier to strike but means the qualifications is going to be somewhat less helpful for harmful hackers to abuse when you look at the world that is real” LeakedSource said, talking about the password storage choices.

    In every, 99-percent regarding the passwords within the FriendFinder Networks databases have now been cracked. Because of scripting that is easy the lowercase passwords aren’t planning to hinder many attackers who’re trying to make the most of recycled qualifications.

    In addition, a number of the documents into the leaked databases have actually an” that is“rm the username, which may suggest a treatment marker, but unless FriendFinder verifies this, there’s not a way to be sure.

    Another interest within the information centers on reports with a contact target of

    Once again, this might suggest the account ended up being marked for deletion, however, if therefore, why ended up being the record completely intact? The exact same might be expected for the accounts with “rm_” included in the username.

    More over, additionally is not clear why the company has documents for, home FriendFinder Networks offered early in the day this to Penthouse Global Media Inc year.

    Salted Hash reached away to FriendFinder Networks and Penthouse worldwide Media Inc. on Saturday, for statements also to ask questions that are additional. This article was written however, neither company had responded by the time. (See update below.)

    Salted Hash additionally reached down to a number of the users with current login documents.

    These users had been element of an example directory of 12,000 documents provided to the news. Not one of them reacted before this informative article went along to print. During the time that is same tries to start reports aided by the leaked current email address failed, because the address had been into the system.

    As things stay, it appears as though FriendFinder Networks Inc. happens to be completely compromised. Vast sums of users from all over the planet have experienced their accounts exposed, leaving them available to Phishing, as well as even worse, extortion.

    That is specially detrimental to the 78,301 individuals who utilized a .mil email, or perhaps the 5,650 individuals who used a .gov current email address, to join up their FriendFinder Networks account.

    From the upside, LeakedSource just disclosed the complete range for the data breach. For the time being, usage of the information is bound, plus it shall never be readily available for general public queries.

    Proper wondering if their or account happens to be compromised, LeakedSource claims it’s far better simply assume this has.

    “If anybody registered a merchant account just before of 2016 on any Friend Finder website, they should assume they are impacted and prepare for the worst,” LeakedSource said in a statement to Salted Hash november.

    On their site, FriendFinder Networks claims they do have more than 700,000,000 total users, spread across 49,000 internet sites inside their system – gaining 180,000 registrants daily.


    FriendFinder has released an advisory that is somewhat public the info breach, but none for the affected sites have already been updated to mirror the notice. As a result, users registering on wouldn’t have an idea that the organization has suffered an enormous protection event, unless they’ve been after technology news.

    In line with the declaration posted on PRNewswire, FriendFinder Networks will begin notifying affected users about the information breach. Nonetheless, it really isn’t clear should they will alert some or all 412 million reports which were compromised. The organization nevertheless hasn’t taken care of immediately concerns delivered by Salted Hash.

    “Based in the ongoing research, FFN will not be able to figure out the actual amount of compromised information. Nevertheless, because FFN values its relationship with customers and provides really the security of consumer information, FFN is within the procedure of notifying impacted users to deliver these with information and help with how they may protect by themselves,” the statement stated to some extent.

    In addition, FriendFinder Networks has employed some other firm to help its investigation, but this company wasn’t known as straight. For the time being, FriendFinder Networks is urging all users to reset their passwords.

    The press release was authored by Edelman, a firm known for Crisis PR in an interesting development. Ahead of Monday, all press needs at FriendFinder Networks had been managed by Diana Lynn Ballou, and this is apparently a current modification.

    Steve Ragan is senior staff author at CSO. ahead of joining the journalism globe in 2005, Steve invested 15 years being a freelance IT specialist centered on infrastructure administration and protection.

    Leave a Reply

    Your email address will not be published. Required fields are marked *