Military dating website says LulzSec hack didn't happen

Share this article:

A military dating website, which a band of hackers claimed this week to successfully infiltrate to pillage members' personal information, was not actually hacked, according to its administrator.

In a comment left on a website that chronicles data breaches, an unidentified admin for Tennessee-based E Singles Inc. denied that its website, MilitarySingles.com, was breached, despite claims to the contrary.

Hackers from the newly launched group LulzSec Reborn on Sunday exposed the email account information, including names, usernames, passwords and IP addresses, belonging to some 170,000 members of MilitarySingles.com, according to a Pastebin document.

But in the comment, left on DataBreaches.net, the admin said the hack never happened. Among the evidence, they said the number of members in the site's database did not match the number claimed to have been affected, and that its users' passwords are encrypted.

The publisher of DataBreaches.net, who uses the alias "Dissent," responded that she was unconvinced, both that the breach didn't happen and that the site's passwords are secure.

"If I seem skeptical, however, it's because the entries in the data dump do match the pictures your site displays of 'members online,'" Dissent wrote. "I have been covering this stuff for a while now, and frankly, have never known Anonymous-related data dumps to be fabricated. As to the passwords in the data dump, I ran a bunch of them through an MD-5 cracker and was able to figure out the passwords. If you used MD-5, please note it's no longer considered very secure."

Security firm KoreLogic, according to a tweet, corroborated those findings.

"There are some claims that MilitarySingles.com was recently hacked," said a Facebook post from MilitarySingles.com. "We want to assure all our members that these claims are false and that there is no evidence that such an event occurred. Furthermore, we want to assure all our members that our database is secure and that your passwords are encrypted."

Share this article:

Sign up to our newsletters

More in News

Medical transcription provider settles data security charges

GMR Transcription Services in California agreed to settle FTC charges related to its security practices.

Researcher hacks network connected devices in own home

Researcher hacks network connected devices in own home

In his own home, a researcher was able to hack various network connected devices that are not computers and mobile phones.

Study: Most higher ed malware infections attributed to 'Flashback'

Study: Most higher ed malware infections attributed to ...

Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware.