Adult friend finder accounts
A database of usernames, emails, and passwords of footloose and fancy free members, along with those from associated websites, has leaked and surfaced online.
The breach has not been confirmed by the site’s parent company Friend Finder Networks, which is reportedly looking into claims of yet ahother hack.
Last month a hacker known as Revolver or 1x0123 claimed he had gained access to the site’s backend servers through a Local File Inclusion hack before posting two screenshots purporting to show compromised data to his Twitter feed.
The latest breach follows a high profile hack in May 2015 that led to the leaking of 4 million records.
LFI is an exploit of a vulnerability that occurs an input is not properly sanitized. FFN had no parameters when setting up an online account allowing users to create simple passwords, of the 412 million users 900,420 of the user passwords were “123456”.
This means that the page is not protected against directory traversal characters, such as dot-dot-slash, which can lead to code being injected into a path that leads to a file. The main purpose of the security breach seemed to be to harvest private information that was weakly secured. was hacked exposing 4 million accounts which contained sensitive information including sexual preferences and whether a user was looking for an external affair. One of the biggest reasons SHA-1 is vulnerable is because of an exploit called “collision”.
The breach released more than 20 years of confidential data and accessed five other branch companies.
The Adult Friend Finder and other sister companies are a huge target for hackers.
As our understanding of the cyber world evolves, love becomes harder and harder to find.
This type of attack would allow the hacker to view local files stored on the server. SHA-1 is a hash function algorithm that encrypts and hides files and data.