Adult friend finder mobile best free adult dating site
However, much the same way metadata collection provides insight to the NSA, this type of information provides attackers with plenty of leverage that can be used against the public.Spear phishing becomes a lot easier when attackers not only have an email address, but also location, language, and race.The scenario is highly reminiscent of the Ashley Madison hack last year.During that data breach, the details of around 37 million users worldwide were compromised, with a number of people's usernames, login details and other credentials were posted online in protest at parent company Avid Life Media's account deletion process, which people paid for but failed to deliver on its promises.Another possible mechanism could have been hijacking ssh keys from a compromised admin account or github, but those tend to be secondary in most cases.Either way, the database dump itself is 570 megabytes, and assuming the data was exfiltrated in a few large transactions, it would have been very noticeable on a network level.That is, if Adult Friend Finder were using a solution that provided visibility into network traffic.
The leaked information included credit card numbers, usernames, passwords, birth dates, physical addresses and personal — you know — preferences.The professional nature of many of the email addresses found in the Ashley Madison hack (.gov, .mil, etc.) should have served as a wakeup call for users engaging in this behavior, however with the professional emails contained in this breach seems to show that people are still using work accounts for questionable activity.We’ve seen this situation many times before and it likely means these were users who tried to delete their account but the data is obviously still kept around because you know, we’re looking at it.Hackers reportedly breached Friend Finder Networks last month, and gained access to over 300 million accounts on Adult Friend Finder, which markets itself as the “World’s largest sex & swinger community.” The hack also exposed over 62 million accounts on Cams.com, a site for live webcam “sex chat,” over 7 million on Penthouse.com, over 1.4 million on Stripshow.com, over 1.1 million on i and a little over 35,000 on an “unknown domain.” Friend Finder’s network was reportedly hacked through a local file inclusion exploit, which enabled the hackers to access all of the network’s sites.For now, Leaked Source says it will not make the data set searchable by the general public. For one, the company either stored user passwords in plaintext, without any protection, or hashed them using the notoriously weak SHA1 algorithm, according to Leaked Source.According to a reporter it is impossible to register an account using an email that’s formatted this way which means the addition of “@deleted.com” was done behind the scenes by Adult Friend Finder.So counting the amount of emails with “@deleted” near the end, we have 15,766,727 “deleted” accounts in Adult Friend Finder .In this case, the administrator would have had two opportunities to notice the abnormality: 1) At the database level, as the data was extracted.2) At the webserver level, where an abnormal amount of traffic would be sent to a specific address.Organizations like Adult Friend Finder should gain the necessary endpoint and network visibility needed to protect their customers’ personal data and “hook up” with a company like Ziften.Hook-up and dating site Adult Friend Finder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.