Cupid Media hack exposed 42m online dating passwords

Cupid Media hack exposed 42m online dating passwords

A few of Cupid Media’s web web web sites. Photograph: /Screenshot Photograph: Screenshot

As much as 42 million individuals’ unencrypted names, times of delivery, e-mail addresses and passwords are taken by hackers who broke into a business that operates niche online internet dating sites.

Cupid Media, which operates niche online internet dating sites such as, and, had been hacked in January but failed to admit into the break-in until it had been exposed by safety researcher Brian Krebs.

Cupid Media is certainly not linked to okay Cupid, A united states dating internet site.

The information taken from Cupid Media, which operates 35 online dating sites entirely, had been found by Krebs regarding the server that is same housed individual information taken from Adobe, whom disclosed their breach previously in November. But unlike Adobe, which used some encryption regarding the information, Cupid Media stored individual information in ordinary text. Along with passwords, which includes names that are full email details, and times of birth.

Cupid’s handling director Andrew Bolton admitted to Krebs that the breach had took place 2013 january. During the time, “we took that which we believed to be appropriate actions to inform affected clients and reset passwords for a specific number of individual reports,” Bolton stated. “We are in the act of double-checking that most affected records have experienced their passwords reset and also have received a message notification.”

Nevertheless like Adobe, Cupid has just notified active users who are impacted by the info breach.

Into the full situation regarding the pc computer software giant, there have been a lot more than 100m inactive, disabled and test reports impacted, along with the 38m to which it admitted during the time.

Bolton told Krebs that “the true wide range of active users suffering from this occasion is dramatically lower than the 42 million which you have actually formerly quoted”. He additionally confirmed that, because the breach, the business has begun encrypting passwords making use of strategies called salting and hashing – an industry-standard security measure which renders most leakages safe.

Jason Hart of Safenet commented: “the real effect regarding the breach is going to be huge. Yet, if this information was in fact encrypted in the first place then all hackers could have discovered is scrambled information, making the theft pointless.”

He included: “A lot of companies shy far from encryption due to worry so it will be either too high priced or complicated.

The truth is so it doesn’t need to be either. With hacking efforts becoming very nearly an occurrence that is daily it is clear that being breached just isn’t a concern of ‘if’ but ‘when’. Although their motives might be various, a hacker’s goal that is ultimate to get usage of sensitive and painful information, so organizations must make sure they truly are using the necessary precautions.”

He recommended adam4adam that too numerous protection divisions are “holding to the past” inside their protection strategy by attempting to avoid breaches as opposed to safeguarding the data.

Much like other breaches, analysis of this released data provides some interesting information. More than three quarters associated with users had registered with either a Hotmail, Gmail or Yahoo email, many addresses hint at more serious protection issues. Significantly more than 11,000 had utilized a US armed forces email to join up, and around 10,000 had registered with A united states federal federal federal government target.

Regarding the passwords that are leaked nearly two million picked “123456”, and over 1.2 million selected “111111”. “iloveyou” and “lovely” both beat away “password”, and even though 40,000 chose “qwerty”, 20,000 opted the underside row of this keyboard alternatively – yielding the password “zxcvbnm”.

Leave a Reply

Your email address will not be published. Required fields are marked *