Adult friend finder hacked accounts
We examine some examples of how enterprises can cull this data to find the clues they need.
Editor’s Note: In the tech indsutry, where everyone is constantly preparing for the inevitable, Jeremy Ho, Aaron Murray, Christopher Barron, Spencer Thomas and Vincent Le describe one of the most prominent web application targeted attacks in this blog post — Local File Inclusion (LFI), which also led to one of the biggest hacks in 2016 that revealed millions of customers’ sensitive information.
This means that the page is not protected against directory traversal characters, such as dot-dot-slash, which can lead to code being injected into a path that leads to a file. The main purpose of the security breach seemed to be to harvest private information that was weakly secured. was hacked exposing 4 million accounts which contained sensitive information including sexual preferences and whether a user was looking for an external affair. One of the biggest reasons SHA-1 is vulnerable is because of an exploit called “collision”.
One security analyst had previously warned the company of a local file inclusion flaw, and following that warning the hackers were able to run malicious software. A collision occurs when two different message inputs, or passwords, generate the same hash.
This time, email addresses, passwords, dates of last visits, browser information, IP addresses, and site membership status were revealed, reports The Guardian, citing data breach monitoring service Leaked Source.
The Adult Friend Finder and other sister companies are a huge target for hackers.
Clearly, it has the burden of handling an abundant amount of sensitive information and it would only make sense for them to have an excellent security measure to keep intruders out.
As our understanding of the cyber world evolves, love becomes harder and harder to find.
More than ever, people are turning to online dating as their sole source of companionship, feeding their personal information to the websites.