Strength, quality, and high performance paper packaging solutions

412 million FriendFinder records exposed by code hackers

412 million FriendFinder records exposed by code hackers

Hacked reports connected to,,,, and

Six databases from FriendFinder Networks Inc., the business behind a few of the world’s largest adult-oriented websites that are social have now been circulating online simply because they had been compromised in October.

LeakedSource, a breach notification internet site, disclosed the event completely on Sunday and stated the six compromised databases exposed 412,214,295 reports, with all the majority of them originating from

When expected straight concerning the presssing problem, 1×0123, that is additionally understood in certain sectors because of the title Revolver, stated the LFI ended up being found in a module on AdultFriendFinder’s production servers.

Not very long after he disclosed the LFI, Revolver claimed on Twitter the issue ended up being fixed, and “. no consumer information ever left their web web site.”

Their account on Twitter has since been suspended, but during the time he made those feedback, Diana Lynn Ballou, FriendFinder Networks’ VP and Senior Counsel of business Compliance & Litigation, directed Salted Hash for them in reaction to follow-up questions regarding the event.

On October 20, 2016, Salted Hash ended up being the first to ever report FriendFinder Networks had most likely been compromised despite Revolver’s claims, exposing significantly more than 100 million reports.

As well as the leaked databases, the presence of supply rule from FriendFinder Networks’ manufacturing environment, aswell as leaked public / private key-pairs, further put into the mounting proof the corporation had experienced a severe information breach.

FriendFinder Networks never offered any extra statements in the matter, even with the extra documents and supply rule became knowledge that is public.

As previously mentioned, previous estimates put the FriendFinder Networks information breach at a lot more than 100 million records.

These very early quotes had been on the basis of the size associated with the databases being prepared by LeakedSource, along with provides being created by other people online claiming to obtain 20 million to 70 million FriendFinder documents – many of them originating from

The main point is, these documents occur in numerous places online. They may be being offered or shared with whoever could have a pursuit inside them.

On Sunday, LeakedSource reported the count that is final 412 million users exposed, making the FriendFinder Networks leak the greatest one yet in 2016, surpassing the 360 million documents from MySpace in might.

This information breach additionally marks the time that is second users have experienced their username and passwords compromised; the first occasion being in May of 2015, which impacted 3.5 million individuals.

The numbers disclosed by LeakedSource on include sunday:

    339,774,493 compromised records from

62,668,630 records that are compromised

7,176,877 compromised documents form

1,135,731 records that are compromised

1,423,192 compromised records from

  • 35,372 compromised documents from a domain that is unknown
  • Most of the databases have usernames, e-mail details and passwords, that have been saved as plain text, or hashed SHA1 that is using with. It really isn’t clear why such variants occur.

    “Neither technique is considered protected by any stretch for the imagination and moreover, the hashed passwords appear to have been changed to any or all lowercase before storage which made them in an easier way to strike but means the qualifications are going to be somewhat less helpful for harmful hackers to abuse within the world that is real” LeakedSource said, talking about the password storage space choices.

    In most, 99-percent for the passwords into the FriendFinder Networks databases were cracked. Because of simple scripting, the lowercase passwords aren’t likely to hinder many attackers who’re seeking to benefit from recycled credentials.

    In addition, a few of the documents within the leaked databases have actually an “rm_” before the username, which may suggest a reduction marker, but unless FriendFinder verifies this, there’s not a way to be sure.

    Another interest when you look at the information centers on records with a contact address of

    Once more, this may suggest the account ended up being marked for removal, however if therefore, why had been the record completely intact? The exact same might be expected for the accounts with “rm_” within the username.

    Furthermore, in addition it is not clear why the ongoing company has documents for, a house FriendFinder Networks offered early in the day this year to Penthouse worldwide Media Inc.

    Salted Hash reached away to FriendFinder Networks and Penthouse Global Media Inc. on Saturday, for statements also to ask additional questions. Because of the time this informative article ended up being written nevertheless, neither business had answered. (See update below.)

    Salted Hash also reached away to a few of the users with current login documents.

    These users had been section of an example set of 12,000 documents provided to the news. Not one of them reacted before this short article went along to printing. During the exact same time, tries to start reports with all the leaked current email address failed, since the target had been into the system.

    As things stay, it seems just as if FriendFinder Networks Inc. happens to be thoroughly compromised. Vast sums of users from all over the world have experienced their reports exposed, making them available to Phishing, and on occasion even even worse, extortion.

    This is certainly particularly harmful to the 78,301 those who utilized a .mil current email address, or the 5,650 individuals who utilized a .gov current email address, to join up their FriendFinder Networks account.

    From the upside, LeakedSource just disclosed the complete range associated with information breach. For the time being, use of the info is limited, also it will never be designed for public queries.

    For anybody wondering if their or account happens to be compromised, LeakedSource says it is far better simply assume this has.

    “If anybody registered a free account just before November of 2016 on any Friend Finder web site, they ought to assume these are typically affected and get ready for the worst,” LeakedSource said in a declaration to Salted Hash.

    On their site, FriendFinder Networks claims they do have more than 700,000,000 total users, distribute across 49,000 internet sites within their system – gaining 180,000 registrants daily.


    FriendFinder has granted a notably general public advisory about the information breach, but none associated with the affected web sites have already been updated to mirror the notice. As a result, users registering on wouldn’t have an idea that the business has experienced an enormous safety event, unless they’ve been technology news that is following.

    In accordance with the statement posted on PRNewswire, FriendFinder Networks will begin notifying users that are affected the info breach. Nevertheless, it’sn’t clear when they will alert some or all 412 million reports which were compromised. The business continues to haven’t taken care of immediately concerns delivered by Salted Hash.

    “Based in the ongoing research, FFN will not be in a position to determine the precise number of compromised information. Nevertheless, because FFN values customers and takes to its relationship really the security of consumer information, FFN is within the means of notifying impacted users to offer all of them with information and help with the way they can protect by themselves,” the declaration stated to some extent.

    In addition, FriendFinder Networks has employed a firm that is outside support its research, but this company wasn’t known as straight. For the present time, FriendFinder Networks is urging Chatki how to delete account all users to reset their passwords.

    In an appealing development, the pr release had been authored by Edelman, a company known for Crisis PR. Just before Monday, all press demands at FriendFinder Networks had been managed by Diana Lynn Ballou, and this seems to be a current modification.

    Steve Ragan is senior staff journalist at CSO. ahead of joining the journalism globe in 2005, Steve invested 15 years as being a freelance IT specialist centered on infrastructure administration and safety.


    Subscribe to our e-mail newsletter to receive updates.