{"id":2381,"date":"2016-11-14T07:19:55","date_gmt":"2016-11-14T07:19:55","guid":{"rendered":"http:\/\/localhost\/createsly\/?p=2381"},"modified":"2016-11-14T07:19:55","modified_gmt":"2016-11-14T07:19:55","slug":"friendfinder-networks-hack-reportedly-exposed-over-412-million-accounts","status":"publish","type":"post","link":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/2016\/11\/14\/friendfinder-networks-hack-reportedly-exposed-over-412-million-accounts\/","title":{"rendered":"FriendFinder Networks hack reportedly exposed"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>If you have an account on AdultFriendFinder, Cams.com, Penthouse, Stripshow and\/or iCams.com \u2014 and reused it on other sites \u2014 you\u00a0should probably change your password. FriendFinder Networks, the parent company of those sites, has reportedly been hacked, resulting in the leak of of over 412 million accounts, according to Leaked Source (h\/t to\u00a0CSO). For context of just how big this breach is, the Ashley Madison hack affected 32 million people.<\/p>\n<p>Hackers reportedly breached FriendFinder Networks last month, and gained access to over 300 million accounts on AdultFriendFinder, which markets itself as the \u201cWorld\u2019s largest sex &amp; swinger community.\u201d The hack also exposed over 62 million accounts on Cams.com, a site for live webcam \u201csex chat,\u201d over 7 million on Penthouse.com, over 1.4 million on Stripshow.com, over 1.1 million on iCams.com and a little over 35,000 on an \u201cunknown domain.\u201d<\/p>\n<p>FriendFinder\u2019s network was reportedly hacked through a local file inclusion exploit, which enabled the hackers to access all of the network\u2019s sites. For now, LeakedSource says it will not make the data set searchable by the general public.<\/p>\n<div class=\"aside aside-related-articles\">\n<h2>Related Articles<\/h2>\n<p>Yahoo admits employees discovered hack in 2014Weebly hacked, 43 million credentials stolenHYPR raises $3 million to keep hackers from getting their hands on your fingerprints<\/p>\n<\/div>\n<p>FriendFinder messed up in a few ways. For one, the company either stored user passwords in plaintext, without any protection, or hashed them using the notoriously weak SHA1 algorithm, according to LeakedSource. The company also kept logins for a site they don\u2019t even run anymore (FriendFinder sold Penthouse.com to Penthouse Global Media in February). FriendFinder also retained email and passwords for over 15 million people who had deleted their accounts.<\/p>\n<div><\/div>\n<p>\u201cOver the past several weeks, FriendFinder has received a number of reports regarding potential security vulnerabilities from a variety of sources,\u201d FriendFinder Networks Vice President and Senior Counsel Diana Ballou told ZDNet. \u201cImmediately upon learning this information, we took several steps to review the situation and bring in the right external partners to support our investigation.\u201d<\/p>\n<p>Some of the claims were false extortion attempts, Ballou said, but the company \u201cdid identify and fix a vulnerability that was related to the ability to access source code through an injection vulnerability.\u201d<\/p>\n<p>I\u2019ve reached out to FriendFinder and will update this story if I hear back.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; If you have an account on AdultFriendFinder, Cams.com, Penthouse, Stripshow and\/or iCams.com \u2014 and reused it on other sites \u2014 you\u00a0should probably change your password. FriendFinder Networks, the parent &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2587,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33,1],"tags":[40,38,41,39,42],"class_list":["post-2381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","category-uncategorized","tag-network","tag-people","tag-social","tag-technology","tag-world"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-content\/uploads\/2016\/11\/wvutnxz1hsc-green-chameleon-e1483356349921.jpg?fit=1300%2C856&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/posts\/2381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/comments?post=2381"}],"version-history":[{"count":0,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/posts\/2381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/media\/2587"}],"wp:attachment":[{"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/media?parent=2381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/categories?post=2381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/themes.divulgetechnologies.com\/flicknclick\/demo\/wp-json\/wp\/v2\/tags?post=2381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}