Dozens dating websites got breached by Russian hackers

Pierluigi Paganini September 01, 2015

A huge number of individuals are in danger because of massive attacks by Russian hackers, total 97 websites have been broken and most of them are dating sites.

Security experts at Hold Security discovered that a significant amount of websites, including dating portals like the Ashley Madison, has been targeted by massive attacks managed by Russian hackers. The long list of breached websites includes  also employment related portal.

Batch Bunches of stolen data were found on a server by the organization’s examiners, said Alex Holden, Hold Security’s founder and CTO. The server, for reasons being unknown, was not secret key secured, permitting investigation of its substance, he said.

None of the dating locales are as popular as Ashley Madison, which saw sensitive organization data, messages, internal records and subtle elements of 30 million enlisted clients discharged in a staggering information break. Holden said this Russian-speaking group has no links with Impact Team, which claimed credit for the interruption into Ashley Madison.

The data incorporates a rundown of sites and their product vulnerabilities, alongside a few notes written in Russian, said Holden, a local Russian speaker. The majority of the sites were breached subsequent to July 4 through around a week prior it, he said.

russian hackers hacking

The full list rundown has been seen by the DG News Service, yet is not recognizing the sites. Hold Security goes over such stolen information archives often in, their examination, however, it doesn’t have the assets to contact each organization named.

In numerous occurrences, Holden said his examiners have affirmed the product vulnerabilities asserted by the hackers.

A large number of the locals seem to have database defects that, if abused, give attackers the license to get to other data being stored in the frameworks. Those vulnerabilities are known as SQL infusion flaws.

The attackers basically “are doing what security evaluators would,” by remotely examining sites for shortcomings, he said.

Holden said, it doesn’t show up the hackers have attempted to sell the stolen information. What he’s found are huge arrangements of email locations, and for a few websites, lists of decoded passwords.

Hold Security spends significant time in educating organizations when their information turns up to offer in secret markets. Data identified with some of Hold Security’s customers have turned up in this most recent bunch.

Organizations are principally worried that their own representatives may utilize the same secret key to sign up for Web administrations they use at work, putting an organization at danger.

In spite of the fact that security specialists exhort against it, numerous individuals re-use passwords crosswise over sites, which is hazardous if one gets traded off.

Holden said on account of Ashley Madison, his customers were concerned if abnormal state workers or those with discriminating employments would be occupied by the data breach.
It’s not obvious as of now that what the hackers’ plan is to do with this information. It doesn’t look like that the idea they’ve stolen is more sensitive information of enrolled clients, similar to the case with Ashley Madison, where delicate profile data were dumped, including conception dates, dating inclinations and GPS information.

“These hackers don’t know how to adapt whatever remains of the information, so they take things that they can adapt,” Holden said.

Usernames and passwords are helpful for spammers. The email locations can likewise be utilized by reprobates to coerce individuals from dating locales, Holden said.

Different reports coming from the Ashley Madison breach have shown a few folks have been focused by coercion endeavors over email.

Different times, spammers utilized this sort of information to debilitate sites with circulating DOS (Denial of Service) attacks, which can thump a site logged off, so as to concentrate a payment.

It doesn’t show up these attackers have the same motivation as the Impact Team, Holden said. Impact Team seemed to have an extremely individual motivation, heavily specifying Avid Life Media’s previous CEO, Noel Biderman, who left the organization on Friday.

Written by: Ali Qamar, Founder/Chief Editor at SecurityGladiators.com

Author Bio:
Ali Qamar is an Internet security research enthusiast who enjoys “deep” research to dig out modern discoveries in the security industry. He is the founder and chief editor at Security Gladiators, an ultimate source for cyber security. To be frank and honest, Ali started working online as a freelancer and still shares the knowledge for a living. He is passionate about sharing the knowledge with people, and always try to give only the best. Follow Ali on Twitter @AliQammar57

Pierluigi Paganini

(Security Affairs – dating websites, Russian hackers)



you might also like

leave a comment