Military dating website says LulzSec hack didn't happen

Share this article:

A military dating website, which a band of hackers claimed this week to successfully infiltrate to pillage members' personal information, was not actually hacked, according to its administrator.

In a comment left on a website that chronicles data breaches, an unidentified admin for Tennessee-based E Singles Inc. denied that its website, MilitarySingles.com, was breached, despite claims to the contrary.

Hackers from the newly launched group LulzSec Reborn on Sunday exposed the email account information, including names, usernames, passwords and IP addresses, belonging to some 170,000 members of MilitarySingles.com, according to a Pastebin document.

But in the comment, left on DataBreaches.net, the admin said the hack never happened. Among the evidence, they said the number of members in the site's database did not match the number claimed to have been affected, and that its users' passwords are encrypted.

The publisher of DataBreaches.net, who uses the alias "Dissent," responded that she was unconvinced, both that the breach didn't happen and that the site's passwords are secure.

"If I seem skeptical, however, it's because the entries in the data dump do match the pictures your site displays of 'members online,'" Dissent wrote. "I have been covering this stuff for a while now, and frankly, have never known Anonymous-related data dumps to be fabricated. As to the passwords in the data dump, I ran a bunch of them through an MD-5 cracker and was able to figure out the passwords. If you used MD-5, please note it's no longer considered very secure."

Security firm KoreLogic, according to a tweet, corroborated those findings.

"There are some claims that MilitarySingles.com was recently hacked," said a Facebook post from MilitarySingles.com. "We want to assure all our members that these claims are false and that there is no evidence that such an event occurred. Furthermore, we want to assure all our members that our database is secure and that your passwords are encrypted."

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.