Hackers steal passwords, emails from hookup websites

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54573

    #1

    Hackers steal passwords, emails from hookup websites

    Two gay hookup websites have been breached with sensitive and personal user data stolen and sold online, new reports have claimed.

    The databases, which are now being sold on dark web forums, were taken from platforms called TruckerSucker, and CityJerks.

    They contain enough personally identifiable information to engage in identity theft, such as usernames and passwords, email addresses, profile pictures, ****** preferences, birth dates, postal addresses, IP addresses, and bios. The passwords are encrypted, but according to TechCrunch, the algorithm is “weak” and could be broken by a more persistent hacker.

    [HEADING=1]The silent treatment[/HEADING]

    HaveIBeenPwned founder Troy Hunt, who was tipped off on the leak, described the incident as a “typical forum breach, albeit with super sensitive content.”

    However the content includes more than just identity data, as there are also messages users exchanged, including arranging meetings and describing their ****** preferences.

    In total, more than 80,000 people have been affected by this incident, the publication states. Roughly 8,000 TruckerSucker users were compromised, together with 77,000 people from CityJerks.

    At the moment, the owners and maintainers of these two websites are silent on the matter.

    Read more
    Clop ransomware may have infected even more victims than previously thought

    Saks Fifth Avenue becomes latest Clop ransomware victim

    Check out the best password managers right now
    The two websites share an almost identical visual design, which might mean they’re operated by the same company and could be using the same content management system (CMS), which might be why the attackers managed to breach just these two. Unfortunately, until the owners share any updates, it’s impossible to know exactly how they were compromised, if the threat actors discovered a zero-day, used any known malware, or any unique social engineering tactics.

    If the passwords are as weak as it’s being claimed, a hacker might decrypt them and run them against other, more potent platforms, such as financial services. As consumers often use the same username/password combinations across a wide array of services, this breach might end up being a lot more destructive.

    [ul]
    [li]These are the best VPN services right now[/li][/ul]

    Via: TechCrunch

    Continue reading…
Working...