While there is currently no suggestion of a public data leak, the situation could prove very serious for the company if it is real; a leak would expose vulnerable data that is both highly personal and potentially embarassing.Our sister site, IT PRO, has contacted Friend Finder Networks for a response to 1x0123's allegations, but has not received a response at the time of publication.The scenario is highly reminiscent of the Ashley Madison hack last year.During that data breach, the details of around 37 million users worldwide were compromised, with a number of people's usernames, login details and other credentials were posted online in protest at parent company Avid Life Media's account deletion process, which people paid for but failed to deliver on its promises.The professional nature of many of the email addresses found in the Ashley Madison hack (.gov, .mil, etc.) should have served as a wakeup call for users engaging in this behavior, however with the professional emails contained in this breach seems to show that people are still using work accounts for questionable activity.We’ve seen this situation many times before and it likely means these were users who tried to delete their account but the data is obviously still kept around because you know, we’re looking at it.Organizations like Adult Friend Finder should gain the necessary endpoint and network visibility needed to protect their customers’ personal data and “hook up” with a company like Ziften.Hook-up and dating site Adult Friend Finder has a serious database vulnerability that could reveal usernames, passwords and other information, it has been claimed.
Under the Friend Finder Network exists numerous adult websites of which Adult Friend Finder . Combined, these websites contain over 412 million past and present users, all affected by the latest hack. com, the Friend Finder Network includes numerous adult-oriented “hookup” websites which include
What's often not highlighted in these cases is the monetary value of such a breach.
Many would argue that having an email address and the associated data might be of little value.
In this case, the administrator would have had two opportunities to notice the abnormality: 1) At the database level, as the data was extracted.
2) At the webserver level, where an abnormal amount of traffic would be sent to a specific address.