Adult friend finder adulthookup com scam
What's often not highlighted in these cases is the monetary value of such a breach.
Many would argue that having an email address and the associated data might be of little value.
In addition to launching an internal review, Friend Finder Networks has hired Mandiant, a high-profile cybersecurity company, to investigate the hack, and is working with the FBI.
Meanwhile, the person who originally dumped the information on the so-called darkweb, who uses the nickname ROR[RG}, is demanding more than £10,000 for access to the database of users, and capitalising on the news by marketing his cybercrime services.
The online dating company would not comment on the read receipt, but said its “leadership” only became aware of the breach on 20 May when contacted by Channel 4 News.
The leaked information included credit card numbers, usernames, passwords, birth dates, physical addresses and personal — you know — preferences.Considering the personal nature of the leaked information and its source, the hack could also open victims to blackmail schemes.In a statement, California-based Friend Finder Networks Inc., which owns Adult Friend Finder and about 20 other dating sites, said it had "just been made aware of a potential data security issue" and that it had begun working with law enforcement and cybersecurity forensics firm Mandiant, part of Fire Eye."Until the investigation is completed, it will be difficult to determine with certainty the full scope of the incident, but we will continue to work vigilantly to address this potential issue and will provide updates as we learn more from our investigation," the statement said.Adult Friend Finder users are finding themselves exposed in ways they never dreamed of when they signed up for the online hooking up service.According to reports, a hacker by the name of ROR[RG] hacked the site and stole all kinds of information about the site’s users.However, much the same way metadata collection provides insight to the NSA, this type of information provides attackers with plenty of leverage that can be used against the public.Spear phishing becomes a lot easier when attackers not only have an email address, but also location, language, and race.The data gave not only usernames, postal codes and dates of birth, but also an indication of which users were seeking an extra-marital affair.In its response to our story, the company stated that it had “only just been made aware” of the hack.In other words, they’ll demand money in exchange for not telling the world just how kinky your fetishes are.One interesting piece of information that has come out of this exposure is that the site doesn’t have quite as many female users as the promotional material might lead you to believe.