eHarmony falls prey to LinkedIn crypto crackers

Powered by SC Magazine
 

But company mum on details.

Dating site eHarmony has confirmed user passwords were leaked in a massive cache uploaded to the internet this week.

The passwords did not contain account usernames, according to the adult dating company.

"After investigating reports of compromised passwords, we have found that a small fraction of our user base has been affected," the company said on its blog.

The passwords were contained in the same dump that exposed potentially 6.5 million LinkedIn users.

News broke about the leak of unsalted LinkedIn passwords after user dwdm uploaded the stolen cache to the cryptographic boffin web site insidepro.

Password crackers quickly got to work assisting dwdm to break the SHA-1 cryptographic function.

The words eHarmony and harmony were cited in a second list on the web site but it remained unclear from where the passwords were stolen.

User dwdm did not respond to questions by SC Magazine about the origins of the cache.

EHarmony has reset passwords for "affected" accounts

Copyright © SC Magazine, Australia


eHarmony falls prey to LinkedIn crypto crackers
 
 
 
Top Stories
Time management tips for CIOs
[Blog post] How to get to the genba.
 
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1109

Vote