Military dating website says LulzSec hack didn't happen

Share this article:

A military dating website, which a band of hackers claimed this week to successfully infiltrate to pillage members' personal information, was not actually hacked, according to its administrator.

In a comment left on a website that chronicles data breaches, an unidentified admin for Tennessee-based E Singles Inc. denied that its website, MilitarySingles.com, was breached, despite claims to the contrary.

Hackers from the newly launched group LulzSec Reborn on Sunday exposed the email account information, including names, usernames, passwords and IP addresses, belonging to some 170,000 members of MilitarySingles.com, according to a Pastebin document.

But in the comment, left on DataBreaches.net, the admin said the hack never happened. Among the evidence, they said the number of members in the site's database did not match the number claimed to have been affected, and that its users' passwords are encrypted.

The publisher of DataBreaches.net, who uses the alias "Dissent," responded that she was unconvinced, both that the breach didn't happen and that the site's passwords are secure.

"If I seem skeptical, however, it's because the entries in the data dump do match the pictures your site displays of 'members online,'" Dissent wrote. "I have been covering this stuff for a while now, and frankly, have never known Anonymous-related data dumps to be fabricated. As to the passwords in the data dump, I ran a bunch of them through an MD-5 cracker and was able to figure out the passwords. If you used MD-5, please note it's no longer considered very secure."

Security firm KoreLogic, according to a tweet, corroborated those findings.

"There are some claims that MilitarySingles.com was recently hacked," said a Facebook post from MilitarySingles.com. "We want to assure all our members that these claims are false and that there is no evidence that such an event occurred. Furthermore, we want to assure all our members that our database is secure and that your passwords are encrypted."

Share this article:

Sign up to our newsletters

More in News

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis ...

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.