• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
200m adult cam model, user records exposed in stripchat breach

200M Adult Cam Model, User Records Exposed in Stripchat Breach

You are here: Home / Cloud Security News / 200M Adult Cam Model, User Records Exposed in Stripchat Breach
November 16, 2021

The leak integrated model details, chat messages and payment specifics.

A database made up of the remarkably sensitive info on both buyers and types on the common grownup cam web site StripChat ended up found online, left entirely unprotected. The facts publicity puts models and users at risk of extortion, violence and much more.

Stripchat is a well-known site founded in 2016 and primarily based in Cyprus that sells stay access to nude products.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Volodymyr “Bob” Diachenko, head of security analysis Comparitech, described that he uncovered the databases on an Elasticsearch cluster on Nov. 5. It contained about 200 million Stripchat data, he reported, which include 65 million user documents containing email addresses, IP addresses, the amount in ideas they gave to designs, a timestamp of when the account was designed and the final action.

One more database contained about 421,000 documents for the platform’s models, which includes their usernames, gender, studio IDs, tip menus and costs, reside status and what is named their “strip score.”

It’s unclear if anyone with nefarious needs managed to entry it in advance of it was secured on Nov. 7.

Stripchat Information Publicity Risk

“The exposure could pose a significant privacy risk for each Stripchat viewers and versions,” Diachenko said. “If the information was stolen, they could confront harassment, humiliation, stalking, extortion, phishing and other threats, the two on the net and offline.”

Register now for our Reside event!

Stripchat consumer and design info could also be employed in focused phishing strategies.

“Victims must be on the lookout for focused phishing email messages from fraudsters posing as Stripchat or a associated organization,” Diachenko  warned. “Never click on on hyperlinks or attachments in unsolicited e-mail.”

The privacy risk for both equally consumers and versions becomes far more substantial if the exposed data is cross-referenced with other breaches, so the whole profile of a particular person is drawn.
“Stripchat information, in fact, does not expose a good deal of personalized information, and I do truly feel that a lot of consumers going to this kind of sites choose not to state their serious identities, e-mails and many others.,” Diachenko told Threatpost. “They generally use VPN services, far too, to conceal their IP addresses. Continue to, a good deal of this info can be matched with other details breaches and some additional details would occur up, that’s my stage below.”

The exposure was reported to Stripchat on Nov.5, with multiple make contact with points through email and Twitter susequently. Even though the organization did not instantly answer to Diachenko’s disclosure, he explained that as of Nov. 7, the data was secured.

“Sites like Stripchat need to have more robust security tactics and at the very least employ incident reaction protocols when getting alerts like this from the security neighborhood,” he instructed Threatpost.

Search Out for Lewd Phishing Lures

Lewd phishing lures are more and more remaining utilised in business email compromise (BEC) campaigns, in accordance to investigate that GreatHorn posted very last summer season. The agency observed a breathtaking 974-per cent uptick in social-engineering frauds utilizing salacious materials, primarily aimed at workers with male-sounding names.

“It doesn’t usually include specific materials, but the intention is to set the consumer off equilibrium, frightened – any enthusiastic psychological state – to lessen the brain’s potential to make rational choices,” in accordance to the report.

Becoming confronted at work with past Stripchat actions would surely make rational pondering tough.

The pandemic has been a boon to cybersex web-sites like Stripchat: The business said that next the onset of the pandemic and lockdowns, the system noticed a 72 percent rise in targeted traffic and extra 906,181,416 new consumers in 2020.

But, as these platforms get consumers, they develop into even bigger targets for attacks.

Leaky Clouds Persist

Stripchat joins a lengthy and illustrious listing of companies with leaky clouds, VIP Video games uncovered the consumer details of 66,000 people early in 2021. Relationship web pages, even Passion Lobby, all have fallen sufferer to a misconfigured cloud. And it is not just the personal sector. Very last summer, Diachenko identified an uncovered Elasticsearch cluster made up of 1.9 million terrorist watchlist information.

When it arrives to community-struggling with cloud storage, Diachekno known as on companies to do considerably a lot more to defend their details.

“Exposure of information by way of misconfiguration is a key issue regardless of whether we are talking about public cloud misconfigurations or of any company exposed to the internet,” he mentioned in an email to Threatpost. “Organizations needs to consistently monitor all resources deployed in their business to lower dangers of these types of exposure. This kind of records can be marketed on the dark web or utilised for additional attacks especially if credentials are involved.”

Want to win back again management of the flimsy passwords standing concerning your network and the upcoming cyberattack? Join Darren James, head of inside IT at Specops, and Roger Grimes, data-pushed protection evangelist at KnowBe4, to locate out how during a absolutely free, Stay Threatpost celebration, “Password Reset: Declaring Command of Qualifications to Stop Attacks,” on Wed., Nov. 17 at 2 p.m. ET. Sponsored by Specops.

Register NOW for the Are living party!

 

 



Some pieces of this article are sourced from:
threatpost.com

Previous Post: «Cyber Security News Ethical Hackers Stymie $27bn of Cybercrime
Next Post: Emotet is Rebuilding its Botnet Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.