DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

28 million Plenty of Fish users’ personal details hacked – report (updated)

Posted on January 31, 2011 by Dissent

The founder and CEO of dating site Plenty of Fish reports that the site has been hacked and users’ names, email addresses, and passwords may have been acquired. Whether PayPal account information and other personal details were also acquired is uncertain and depends on whose version of the hack you read. It’s also uncertain whether other large dating sites have also been hacked. The only thing that seems certain right now is that this is already turning out to be a somewhat bizarre story.

In a blog post that is quite different than the usual breach disclosure, Markus Frind writes on his personal blog about the incident and the extortion attempt that allegedly accompanied it. He even names names. The blog post reads something like a thriller, although I cannot imagine anyone suspecting Brian Krebs of anything other than simply being a reporter who’s attempting to verify a story that came to him.

One of those Frind names, Chris Russo, provides a different version of what happened and his role. In a statement posted on Grumo Media, Russo writes:

Hi, I’m a security researcher from Buenos Aires, Argentina.

The Last Friday 21 of Januray, we discovered a vulnerability in www.plentyoffish.com exposing users details, including usernames, addresses, phone numbers, real names, email addresses, passwords in plain text, and in most of cases, paypal accounts, of more than 28,000,000 (twenty eight million users). This vulnerability was under active explotation by hackers.

So far, it seems reasonable, but the statement gets downright weird when Russo talks about how POF was going to hire him:

While we were creating the legal documents in order to proceed, Markus Frind got progressively more aggressive and unresposive with us, and told us to speak with their employees, Kate and Jay, because there was a serial killer, murdering people from the website.

The story also involves a mysterious request for POF user data, posted yesterday on Freelancer.com by “akshay3471,” whose profile lists him as being in Moradabad, India.

Update 1: Brian Krebs tells his side of the story – the only side I actually can believe without reservation.

I’ll let you all follow the links and read for yourselves. I expect we’ll see a lot more coverage on this one. In the meantime, best to err on the side of caution and assume that the site was compromised and that any information you provided may have been acquired.

Category: Breach IncidentsBusiness SectorHackNon-U.S.Of Note

Post navigation

← New York woman pleads guilty to ID theft scheme
(follow-up) HuskyDirect.com site still down, some victims report fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.