eHarmony falls prey to LinkedIn crypto crackers

Powered by SC Magazine
 

But company mum on details.

Dating site eHarmony has confirmed user passwords were leaked in a massive cache uploaded to the internet this week.

The passwords did not contain account usernames, according to the adult dating company.

"After investigating reports of compromised passwords, we have found that a small fraction of our user base has been affected," the company said on its blog.

The passwords were contained in the same dump that exposed potentially 6.5 million LinkedIn users.

News broke about the leak of unsalted LinkedIn passwords after user dwdm uploaded the stolen cache to the cryptographic boffin web site insidepro.

Password crackers quickly got to work assisting dwdm to break the SHA-1 cryptographic function.

The words eHarmony and harmony were cited in a second list on the web site but it remained unclear from where the passwords were stolen.

User dwdm did not respond to questions by SC Magazine about the origins of the cache.

EHarmony has reset passwords for "affected" accounts

Copyright © SC Magazine, Australia


eHarmony falls prey to LinkedIn crypto crackers
 
 
 
Top Stories
How hard do you hack back?
[Blog post] Taking the offensive could have unintended consequences.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
The big winners from Defence’s back-office IT refresh
Updated: The full list of subcontractors.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1024

Vote