Cupid Media hack exposed 42m online passwords that are dating

A number of Cupid Media’s web web internet sites. Photograph: /Screenshot Photograph: Screenshot

As much as 42 million individuals’ unencrypted names, times of delivery, e-mail details and passwords happen taken by code hackers whom broke into a company that operates niche online internet dating sites.

Cupid Media, which operates niche online internet dating sites such as, and, had been hacked in but did not admit to the break-in until it was exposed by security researcher Brian Krebs january.

Cupid Media just isn’t linked to okay Cupid, A united states site that is dating.

The info taken from Cupid Media, which operates 35 internet dating sites entirely, had been found by Krebs in the exact same server that housed individual information taken from Adobe, whom disclosed their breach previously in November. But unlike Adobe, that used some encryption from the information, Cupid Media retained individual information in simple text. In addition to passwords, which includes complete names, e-mail details, and times of delivery

Cupid’s handling director Andrew Bolton admitted to Krebs that the breach had took place 2013 january. At that time, “we took that which we considered to be appropriate actions to inform affected clients and reset passwords for a specific set of user reports,” Bolton stated. “We are in the act of double-checking that most affected reports have had their passwords reset and now have received a message notification.”

But like Adobe, Cupid has only notified active users who are suffering from the info breach.

When you look at the situation of this computer pc software giant, there were significantly more than 100m inactive, disabled and test reports affected, along with the 38m to which it admitted during the time.

Bolton told Krebs that “the true range active users suffering from this occasion is dramatically lower than the 42 million you have actually formerly quoted”. He additionally confirmed that, considering that the breach, the organization has begun encrypting passwords making use of practices called salting and hashing – an industry-standard safety measure which renders many leaks safe.

Jason Hart of Safenet commented: “the impact that is true of breach will probably be huge. Yet, if this information was encrypted to begin with then all hackers might have discovered is scrambled information, making the theft pointless.”

He included: “A lot of companies shy far from encryption due to worry that it’ll be either too high priced or complicated.

The truth is so it doesn’t need to be either. With hacking efforts becoming nearly an occurrence that is daily it is clear that being breached is certainly not a question of ‘if’ but ‘when’. Although their motives could be various, a hacker’s ultimate objective is to achieve usage of sensitive and painful information, so organizations must ensure these are typically taking the necessary precautions.”

He proposed that too many safety divisions are “holding onto the past” within their safety strategy by wanting to avoid breaches in place of safeguarding the information.

Much like other breaches, analysis of this released data provides some interesting information. More than three quarters for the users had registered with either a Hotmail, Gmail or Yahoo current email address, however some addresses hint at more serious safety issues. A lot more than 11,000 had utilized a US armed forces email to join up, and around 10,000 had registered by having a united states government target.

Associated with the passwords that are leaked nearly two million picked “123456”, and over 1.2 million selected “111111”. “iloveyou” and “lovely” both beat out “password”, even though 40,000 chose “qwerty”, 20,000 opted the underside row of this keyboard alternatively – yielding the password “zxcvbnm”.