Adult friend finder mobile
Networks, the parent company of those sites, has reportedly been hacked, resulting in the leak of of over 412 million accounts, according to Leaked Source (h/t to CSO).For context of just how big this breach is, the Ashley Madison hack affected 32 million people.is calling a “privacy catastrophe,” over 400 million accounts and deleted accounts, were breached on one of the world’s largest adult dating websites as the result of a Local File Inclusion vulnerability. com was acquired by Penthouse in 2007, which subsequently changed its name to Friend Finder Network.Under the Friend Finder Network exists numerous adult websites of which Adult Friend Finder . Combined, these websites contain over 412 million past and present users, all affected by the latest hack. com, the Friend Finder Network includes numerous adult-oriented “hookup” websites which include What's often not highlighted in these cases is the monetary value of such a breach.
The leaked information included credit card numbers, usernames, passwords, birth dates, physical addresses and personal — you know — preferences.
The company also kept logins for a site they don’t even run anymore (Friend Finder sold to Penthouse Global Media in February).
Friend Finder also retained email and passwords for over 15 million people who had deleted their accounts.
Hackers reportedly breached Friend Finder Networks last month, and gained access to over 300 million accounts on Adult Friend Finder, which markets itself as the “World’s largest sex & swinger community.” The hack also exposed over 62 million accounts on Cams.com, a site for live webcam “sex chat,” over 7 million on Penthouse.com, over 1.4 million on Stripshow.com, over 1.1 million on i and a little over 35,000 on an “unknown domain.” Friend Finder’s network was reportedly hacked through a local file inclusion exploit, which enabled the hackers to access all of the network’s sites.
For now, Leaked Source says it will not make the data set searchable by the general public. For one, the company either stored user passwords in plaintext, without any protection, or hashed them using the notoriously weak SHA1 algorithm, according to Leaked Source.