That is, if Adult Friend Finder were using a solution that provided visibility into network traffic.
Ziften ZFlow™ enables network visibility into the cloud to catch aberrant data transfers and attribute to specific executing processes.
Everything from email and home addresses, to sexual preferences and whether the user was looking for relationships outside of their marriages have been lifted.
This includes people who thought they deleted their accounts.
The source IP addresses collected can even provide pinpoint street locations for attacks.
The attack methodology deployed in this instance was not released, but it would be fair to assume that it leveraged a kind of SQL Injection attack or similar, where the information is wormed out of the back-end database through a flaw in the webserver.
Organizations like Adult Friend Finder should gain the necessary endpoint and network visibility needed to protect their customers’ personal data and “hook up” with a company like Ziften.
“Where you’ve got names, dates of birth, ZIP codes, then that provides an opportunity to actually target specific individuals whether they be in government or healthcare for example, so you can profile that person and send more targeted blackmail-type emails,” cybercrime expert Charlie Mc Murdie said.
Another possible mechanism could have been hijacking ssh keys from a compromised admin account or github, but those tend to be secondary in most cases.
Either way, the database dump itself is 570 megabytes, and assuming the data was exfiltrated in a few large transactions, it would have been very noticeable on a network level.
It's the perfect way to make life a little more exciting.
With millions of members from across the world, you can find hot, steamy encounters no matter where you are.