Adult friend finder mobile
Organizations like Adult Friend Finder should gain the necessary endpoint and network visibility needed to protect their customers’ personal data and “hook up” with a company like Ziften.
Hook-up and dating site Adult Friend Finder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.
The professional nature of many of the email addresses found in the Ashley Madison hack (.gov, .mil, etc.) should have served as a wakeup call for users engaging in this behavior, however with the professional emails contained in this breach seems to show that people are still using work accounts for questionable activity.
Spear phishing becomes a lot easier when attackers not only have an email address, but also location, language, and race.Another possible mechanism could have been hijacking ssh keys from a compromised admin account or github, but those tend to be secondary in most cases.Either way, the database dump itself is 570 megabytes, and assuming the data was exfiltrated in a few large transactions, it would have been very noticeable on a network level.The suggestion of a security flaw first came from self-styled "underground researcher" 1x0123 on Tuesday night, who posted on Twitter a screen grab that suggested Adult Friend Finder has a Local File Inclusion (LFI) vulnerability.Researcher 1x0123 wrote: "F**kload of databases with same user/password runing as root".Hackers reportedly breached Friend Finder Networks last month, and gained access to over 300 million accounts on Adult Friend Finder, which markets itself as the “World’s largest sex & swinger community.” The hack also exposed over 62 million accounts on Cams.com, a site for live webcam “sex chat,” over 7 million on Penthouse.com, over 1.4 million on Stripshow.com, over 1.1 million on i and a little over 35,000 on an “unknown domain.” Friend Finder’s network was reportedly hacked through a local file inclusion exploit, which enabled the hackers to access all of the network’s sites.For now, Leaked Source says it will not make the data set searchable by the general public. For one, the company either stored user passwords in plaintext, without any protection, or hashed them using the notoriously weak SHA1 algorithm, according to Leaked Source.In this case, the administrator would have had two opportunities to notice the abnormality: 1) At the database level, as the data was extracted.2) At the webserver level, where an abnormal amount of traffic would be sent to a specific address.is calling a “privacy catastrophe,” over 400 million accounts and deleted accounts, were breached on one of the world’s largest adult dating websites as the result of a Local File Inclusion vulnerability. com was acquired by Penthouse in 2007, which subsequently changed its name to Friend Finder Network.Under the Friend Finder Network exists numerous adult websites of which Adult Friend Finder . Combined, these websites contain over 412 million past and present users, all affected by the latest hack. com, the Friend Finder Network includes numerous adult-oriented “hookup” websites which include