Data Breach

AdultFriendFinder company data breach exposes 412 million accounts

The company that owns AdultFriendFinder and other adult websites has been hacked, data breach exposes 412 million accounts making this the largest 2016 hack

Almost every account password was cracked, thanks to the company’s poor security practices. Even “deleted” accounts were found in the breach.

A new massive data breach is in the headlines, the victim is the adult dating and entertainment website Friend Finder Network. The data breach has exposed more than 412 million accounts, 339 million of which from the AdultFriendFinder.com and over 15 million “deleted” accounts that were still present in the database.

A close look at the databases revealed that 62 million belong to Cams.com, and 7 million from Penthouse.com, the remaining records come from other brands of Friend Finder Network.

Below data provided by the data breach notification LeakedSource that examined the stolen data:

“Friend Finder Network Inc is a company that operates a wide range of 18+ services and was hacked in October of 2016 for over 400 million accounts representing 20 years of customer data which makes it by far the largest breach we have ever seen — MySpace gets 2nd place at 360 million. This event also marks the second time Friend Finder has been breached in two years, the first being around May of 2015.” reads the post published by LeakedSource.

A list of sites we have verified, how many affected accounts and a brief description are as follows:

  • Adultfriendfinder.com
    • 339,774,493 users
    • “World’s largest sex & swinger community”
  • Cams.com
    • 62,668,630 users
    • “Where adults meet models for sex chat live through webcams”
  • Penthouse.com
    • 7,176,877 users
    • Adult magazine akin to Playboy
  • Stripshow.com
    • 1,423,192 users
    • Another 18+ webcam site
  • iCams.com
    • 1,135,731 users
    • “Free Live Sex Cams”
  • Unknown domain
    • 35,372 users

It seems that attackers exploited a local file inclusion flaw in the AdultFriendFinder website that was first reported by the security researcher known as Revolver.

Revolver explained that the exploitation of the flaw on the AdultFriendFinder site could allow a remote attacker to run malicious code on the target web server.

It is still a mystery who is behind the data breach, Revolver denied any involvement in the attack, he blamed users of Russian hacking site instead.

This is the second time Friend Finder Networks is breached by hackers, the first attack occurred in May of 2015 when the attackers exposed almost 4 million accounts.

The analysis of the three largest site’s databases revealed that stolen data includes email addresses, usernames, passwords, site membership data, the IP address last used to log in, and date of the last visit.

The databases don’t contain sexual preference information, unlike the previous data breach.

The users’ passwords were either stored in plaintext or hashed with the SHA-1, which makes easy for hackers to crack them.

LeakedSource already crack 99 percent of all the passwords included in the databases.

Below the list of the Top Ten Passwords from AdultFriendFinder website:

LeakedSource also published a table of top email providers used, from AdultFriendFinder.com only. The vast majority emails are @hotmail.com (96,487,200), @yahoo.com (74,563,930), and @gmail.com (61,754,102).

“There are 5,650 .gov registered emails on all websites combined and 78,301 .mil emails.” states LeakedSource.

LeakedSource confirmed that it will not make the data searchable by the general public for various reasons.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – AdultFriendFinder, data breach)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

17 mins ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

3 hours ago

Linux variant of Cerber ransomware targets Atlassian servers

Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of…

16 hours ago

Ivanti fixed two critical flaws in its Avalanche MDM

Ivanti addressed two critical vulnerabilities in its Avalanche mobile device management (MDM) solution, that can…

23 hours ago

Researchers released exploit code for actively exploited Palo Alto PAN-OS bug

Researchers released an exploit code for the actively exploited vulnerability CVE-2024-3400 in Palo Alto Networks'…

1 day ago

Cisco warns of large-scale brute-force attacks against VPN and SSH services

Cisco Talos warns of large-scale brute-force attacks against a variety of targets, including VPN services,…

1 day ago

This website uses cookies.