{"id":3634,"date":"2013-11-20T19:47:39","date_gmt":"2013-11-20T11:47:39","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3634"},"modified":"2015-09-09T19:36:53","modified_gmt":"2015-09-09T11:36:53","slug":"cupid-media-exposes-42-million-passwords-plain-text","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2013\/11\/cupid-media-exposes-42-million-passwords-plain-text\/","title":{"rendered":"Cupid Media Hack Exposes 42 Million Passwords In Plain Text"},"content":{"rendered":"

42 Million Passwords – now that’s a big number, and the worst part – they aren’t even hashed. Nope, not at all – not even badly. Apparently the intrusion took place earlier this year, in January 2013 – but there was no public announcement.<\/p>\n

The data was found on the same server where the hacked data from some other big heists was stored (Adobe\/PR Newswire\/NW3C etc). And to make it even worse, at least 10% of the users (which itself is over 4 million) use absolutely terrible passwords – passwords that would have been useless even if they were hashed.<\/p>\n

\"Cupid
\nImage Source: Cupid Media Hack Exposed 42M Passwords<\/a><\/em><\/p>\n

Almost 2 million of the users had the password ‘123456<\/em>‘ followed by 1.2 million with ‘111111<\/em>‘ (I’m guessing they had a 6 char minimum password requirement).<\/p>\n

A hack on niche online dating service Cupid Media earlier this year has exposed names, e-mail addresses and\u2014most notably\u2014plain-text passwords for 42 million accounts, according to a published report.<\/p>\n

The cache of personal information was found on the same servers that housed tens of millions of records stolen in separate hacks on sites including Adobe<\/a>, PR Newswire, and the National White Collar Crime Center, KrebsonSecurity journalist Brian Krebs reported Tuesday night. An official with Southport, Australia-based Cupid Media told Krebs that user credentials appeared to be connected to “suspicious activity” that was detected in January. Officials believed they had notified all affected users, but they are in the process of double-checking that all affected accounts have had their passwords reset in light of Krebs’s discovery.<\/p>\n

The compromise of 42 million passwords makes the episode one of the bigger passcode breaches on record. Adding to the magnitude is the revelation the data was in plaintext, instead of a cryptographically hashed format that requires an investment of time, skill, and computing power to crack.<\/p><\/blockquote>\n

Standing at 42 million passwords, it is indeed one of the biggest breaches ever – and whoever got hold of this had to put no time, effort or computing power into brute forcing hashes<\/a>. They just opened the DB dump and had 42 million e-mail addresses and passwords.<\/p>\n

With many people re-using their passwords across multiple sites, this is indeed like striking the lottery for hackers.<\/p>\n

Back in 2011 when Canadian Dating Site PlentyofFish.com was Hacked<\/a>, they exposed 30 million user accounts – so they weren’t far behind. Notice any similarities? Yah both dating sites…and both storing passwords in plain text.<\/p>\n