09-27-2025, 01:26 PM
Hello, visitor!
Article about adult friend finder data leak:
412 Million User Records Stolen From Adult Friend Finder Parent Company. FriendFinder Networks, the company behind 49,000 adult-themed websites, has been hacked and data for 412,214,295 users has been changing hands in hacking netherworlds for the past month. The breach took place recently and included historical data for the past 20 years on six FriendFinder Networks (FFN) properties: Adultfriendfinder.com, Cams.com, Penthouse.com (now property of Penthouse), Stripshow.com.
>> ENTER THE SITE <<
iCams.com, and an unknown domain. Broken down per site, the breach looks like this: Website name No. of affected users No. of plaintext passwords Adultfriendfinder.com 339,774,493 103,070,536 Cams.com 62,668,630 21,422,277 Penthouse.com 7,176,877 495,720 Stripshow.com 1,423,192 342,889 iCams.com 1,135,731 272,409 Unknown domain 35,372 - The last login date included in the stolen files is October 17, 2016, which most likely represents the approximate date of the hack. The origin of the hack. On October 18, CSO Online ran a story on aself-proclaimed security researcher that went by the nickname Revolver, or @1x0123 on Twitter (account now suspended), who said he identified and reported a Local File Inclusion (LFI) vulnerability on the Adult Friend Finder website. Interestingly, Revolver said he reported the issue to FFN, and "no customer information ever left their site," even if a day earlier he wrote on Twitter that if "they will call it hoax again and I will f***ing leak everything." Last year, Revolver also posted screenshots on Twitter in which he claimed he had access to the Naughty America websites. A week later, the Naughty America user database went up for sale on TheRealDeal Dark Web marketplace, albeit put up for sale by another hacker known as Peace of Mind. Over the summer, Revolver also claimed he had access to PornHub's servers, but PornHub representatives called the whole thing a hoax. Today, on a newly created Twitter account, Revolver also posted screenshots showing that he had access to RedTube servers. FFN most likely hacked on October 17, 2016. In fact, rumors that Adult Friend Finder got hacked, despite Revolver reporting the issue to FFN, arose on October 20, when the same CSO Online got wind that at least 100 million user accounts were stolen. The data from this hack eventually came under the possession of LeakedSource, a website that indexes public data breaches and makes the data searchable through its site. Only after the LeakedSource analysis did the world find out the true breadth of the attack, with multiple FFN websites losing data as back as 1997. Based on the SQL tables schema files, the databases did not include any deeply personal information about sexual preferences or dating habits. In 2015, the same Adult Friend Finder website suffered a similar breach and lost deeply personal information on 3.9 million users. This time around it was only usernames, emails, login dates, language preferences, passwords, and a few other more. Most accounts included plaintext passwords. As for the passwords, LeakedSource claims to have cracked 99% of them. LeakedSource says that a large part of the passwords were stored in plaintext but that the company switched to the SHA-1 algorithm at one point in the past. Nevertheless, FFN made some crucial mistakes. "Neither method is considered secure by any stretch of the imagination and furthermore, the hashed passwords seem to have been changed to all lowercase before storage which made them far easier to attack but means the credentials will be slightly less useful for malicious hackers to abuse in the real world," a LeakedSource representative said. An analysis of the most used passwords reveals that over 2.5 million users employed a simple password in the form of "12345" and variations. Analysis of the data also revealed the presence of 15,766,727 emails formatted as "email@address.com@deleted1.com". This type of formatting is employed by companies that want to keep data after users delete their accounts. LeakedSource said it is not adding this data to its index of searchable data breaches, for the time being. At the time of writing, FFN had not issued a public statement regarding the incident. LeakedSource says this is 2016's biggest data breach.
Adult friend finder data leak
Article about adult friend finder data leak:
412 Million User Records Stolen From Adult Friend Finder Parent Company. FriendFinder Networks, the company behind 49,000 adult-themed websites, has been hacked and data for 412,214,295 users has been changing hands in hacking netherworlds for the past month. The breach took place recently and included historical data for the past 20 years on six FriendFinder Networks (FFN) properties: Adultfriendfinder.com, Cams.com, Penthouse.com (now property of Penthouse), Stripshow.com.
>> ENTER THE SITE <<
iCams.com, and an unknown domain. Broken down per site, the breach looks like this: Website name No. of affected users No. of plaintext passwords Adultfriendfinder.com 339,774,493 103,070,536 Cams.com 62,668,630 21,422,277 Penthouse.com 7,176,877 495,720 Stripshow.com 1,423,192 342,889 iCams.com 1,135,731 272,409 Unknown domain 35,372 - The last login date included in the stolen files is October 17, 2016, which most likely represents the approximate date of the hack. The origin of the hack. On October 18, CSO Online ran a story on aself-proclaimed security researcher that went by the nickname Revolver, or @1x0123 on Twitter (account now suspended), who said he identified and reported a Local File Inclusion (LFI) vulnerability on the Adult Friend Finder website. Interestingly, Revolver said he reported the issue to FFN, and "no customer information ever left their site," even if a day earlier he wrote on Twitter that if "they will call it hoax again and I will f***ing leak everything." Last year, Revolver also posted screenshots on Twitter in which he claimed he had access to the Naughty America websites. A week later, the Naughty America user database went up for sale on TheRealDeal Dark Web marketplace, albeit put up for sale by another hacker known as Peace of Mind. Over the summer, Revolver also claimed he had access to PornHub's servers, but PornHub representatives called the whole thing a hoax. Today, on a newly created Twitter account, Revolver also posted screenshots showing that he had access to RedTube servers. FFN most likely hacked on October 17, 2016. In fact, rumors that Adult Friend Finder got hacked, despite Revolver reporting the issue to FFN, arose on October 20, when the same CSO Online got wind that at least 100 million user accounts were stolen. The data from this hack eventually came under the possession of LeakedSource, a website that indexes public data breaches and makes the data searchable through its site. Only after the LeakedSource analysis did the world find out the true breadth of the attack, with multiple FFN websites losing data as back as 1997. Based on the SQL tables schema files, the databases did not include any deeply personal information about sexual preferences or dating habits. In 2015, the same Adult Friend Finder website suffered a similar breach and lost deeply personal information on 3.9 million users. This time around it was only usernames, emails, login dates, language preferences, passwords, and a few other more. Most accounts included plaintext passwords. As for the passwords, LeakedSource claims to have cracked 99% of them. LeakedSource says that a large part of the passwords were stored in plaintext but that the company switched to the SHA-1 algorithm at one point in the past. Nevertheless, FFN made some crucial mistakes. "Neither method is considered secure by any stretch of the imagination and furthermore, the hashed passwords seem to have been changed to all lowercase before storage which made them far easier to attack but means the credentials will be slightly less useful for malicious hackers to abuse in the real world," a LeakedSource representative said. An analysis of the most used passwords reveals that over 2.5 million users employed a simple password in the form of "12345" and variations. Analysis of the data also revealed the presence of 15,766,727 emails formatted as "email@address.com@deleted1.com". This type of formatting is employed by companies that want to keep data after users delete their accounts. LeakedSource said it is not adding this data to its index of searchable data breaches, for the time being. At the time of writing, FFN had not issued a public statement regarding the incident. LeakedSource says this is 2016's biggest data breach.
Adult friend finder data leak