Cupid Media hack exposed 42m online dating passwords

Cupid Media hack exposed 42m online dating passwords

A number of Cupid Media’s web sites. Photograph: /Screenshot Photograph: Screenshot

As much as 42 million individuals’ unencrypted names, times of delivery, e-mail addresses and passwords have already been taken by hackers whom broke into a business that operates niche online internet dating sites.

Cupid Media, which operates niche online internet dating sites such as UkraineDate.com, MilitaryCupid.com and IranianSinglesConnection.com, had been hacked in but did not admit to the break-in until it was exposed by security researcher Brian Krebs january.

Cupid Media is certainly not associated with okay Cupid, A united states dating internet site.

The information taken from Cupid Media, which operates 35 internet dating sites entirely, had been found by Krebs in the exact same server that housed individual information taken from Adobe, whom disclosed their breach earlier in the day in November. But unlike Adobe, that used some encryption from the information, Cupid Media retained user information in simple text. Also passwords, that features complete names, e-mail details, and times of delivery.

Cupid’s handling director Andrew Bolton admitted to Krebs that the breach had happened in January 2013. At that time, “we took that which we thought to be appropriate actions to inform affected clients and reset passwords for the group that is particular of records,” Bolton stated. “We are along the way of double-checking that most affected records have experienced their passwords reset and also have received a message notification.”

Nevertheless like Adobe, Cupid has just notified active users whom are impacted by the info breach.

Within the full instance regarding the computer pc software giant, there were significantly more than 100m inactive, disabled and test reports impacted, along with the 38m to which it admitted at that time.

Bolton told Krebs that “the true wide range of active people suffering from this occasion is significantly significantly less than the 42 million you have actually formerly quoted”. He additionally confirmed that, considering that the breach, the organization has begun encrypting passwords making use of strategies called salting and hashing – an industry-standard security measure which renders many leakages harmless.

Jason Hart of Safenet commented: “the genuine effect regarding the breach will be huge. Yet, if this information was indeed encrypted to begin with then all hackers could have discovered is scrambled information, making the theft pointless.”

He added: “A lot of companies shy far from encryption due to worry that it’ll be either too high priced or complicated.

The stark reality is so it doesn’t need to be either. With hacking efforts becoming very nearly an occurrence that is daily it is clear that being breached isn’t a concern of ‘if’ but ‘when’. Although their motives could be various, a hacker’s goal that is ultimate to get use of painful and sensitive information, so organizations must ensure these are generally using the necessary precautions.”

He proposed that too security that is many are “holding to the past” within their safety strategy by wanting to avoid breaches in the place of safeguarding the info.

Just like other breaches, analysis regarding the released data provides some information that is interesting. More than three quarters associated with users had registered with either a Hotmail, Gmail or Yahoo current email address, however some addresses hint at more security that is serious. Significantly more than 11,000 had utilized a US army email to join up, and around 10,000 had registered having A united states federal government target.

Associated with the leaked passwords, very nearly two million picked “123456”, and over 1.2 million selected “111111”. “iloveyou” and “lovely” both beat away “password”, even though 40,000 chose “qwerty”, 20,000 opted the base row associated with keyboard alternatively – yielding the password “zxcvbnm”.