A group of hackers with a rather odd name has recently been reported to have revealed information about nearly 200,000 people on a dating site designed for people in the US military. This group of hackers appears to emerge from relative obscurity into the lime light from time to time and demonstrate the occasional dangers involved in putting personal information onto the net.
The website that has just been attacked by the hacking attempt is an online dating site created to offer soldiers a method of finding a match with a person who has an interest in military life. It has proved to be a good method for any civilian to discover the soldier of their desires. However, on Monday, according to a company that identifies and assesses hacking attempts, instead of images appearing on the website, there were seen the words “Slideshow information cannot load because of a security problem”. It appears the site had been hacked.
A comment posted by the company on Sunday said the administration for eSingles, the business that runs the military dating site, was in dispute over the hacking of the site. They said that at eSingles they are fully aware of the claim that someone has hacked the soldier’s dating site and are currently investigating the situation.
They said that they take the security and private lives of their members extremely seriously and so, with the necessary security measures to make sure the website and members’ profiles remain secure.
As a result, any current users of the dating site will discover that their username and password choices have been leaked online. The suggestion that has been made is that for anyone who had used the dating website, should immediately change their password for that site, as well as anything else that they have live on the internet.
This dating website hacking attempt was the first “information release” to do with this particular hacking group. The group has just revealed its rebirth, and on 1st April 2012, it will be its launch date proper.
Additionally, the FBI revealed that earlier in March that it already had in custody some of the hackers involved in the first exposure.
The hackers seem to be planning for more data exposures and, on Tuesday, the hackers stated that a 500-kilobyte zip file had been exposed, which includes web surveys, contact data for CSS media personnel, along with user files which appear to include email addresses, usernames and passwords for 9 of the CSS workers.