eHarmony falls prey to LinkedIn crypto crackers

Powered by SC Magazine
 

But company mum on details.

Dating site eHarmony has confirmed user passwords were leaked in a massive cache uploaded to the internet this week.

The passwords did not contain account usernames, according to the adult dating company.

"After investigating reports of compromised passwords, we have found that a small fraction of our user base has been affected," the company said on its blog.

The passwords were contained in the same dump that exposed potentially 6.5 million LinkedIn users.

News broke about the leak of unsalted LinkedIn passwords after user dwdm uploaded the stolen cache to the cryptographic boffin web site insidepro.

Password crackers quickly got to work assisting dwdm to break the SHA-1 cryptographic function.

The words eHarmony and harmony were cited in a second list on the web site but it remained unclear from where the passwords were stolen.

User dwdm did not respond to questions by SC Magazine about the origins of the cache.

EHarmony has reset passwords for "affected" accounts

Copyright © SC Magazine, Australia


eHarmony falls prey to LinkedIn crypto crackers
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 704

Vote