DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

28 million Plenty of Fish users’ personal details hacked – report (updated)

Posted on January 31, 2011 by Dissent

The founder and CEO of dating site Plenty of Fish reports that the site has been hacked and users’ names, email addresses, and passwords may have been acquired. Whether PayPal account information and other personal details were also acquired is uncertain and depends on whose version of the hack you read. It’s also uncertain whether other large dating sites have also been hacked. The only thing that seems certain right now is that this is already turning out to be a somewhat bizarre story.

In a blog post that is quite different than the usual breach disclosure, Markus Frind writes on his personal blog about the incident and the extortion attempt that allegedly accompanied it. He even names names. The blog post reads something like a thriller, although I cannot imagine anyone suspecting Brian Krebs of anything other than simply being a reporter who’s attempting to verify a story that came to him.

One of those Frind names, Chris Russo, provides a different version of what happened and his role. In a statement posted on Grumo Media, Russo writes:

Hi, I’m a security researcher from Buenos Aires, Argentina.

The Last Friday 21 of Januray, we discovered a vulnerability in www.plentyoffish.com exposing users details, including usernames, addresses, phone numbers, real names, email addresses, passwords in plain text, and in most of cases, paypal accounts, of more than 28,000,000 (twenty eight million users). This vulnerability was under active explotation by hackers.

So far, it seems reasonable, but the statement gets downright weird when Russo talks about how POF was going to hire him:

While we were creating the legal documents in order to proceed, Markus Frind got progressively more aggressive and unresposive with us, and told us to speak with their employees, Kate and Jay, because there was a serial killer, murdering people from the website.

The story also involves a mysterious request for POF user data, posted yesterday on Freelancer.com by “akshay3471,” whose profile lists him as being in Moradabad, India.

Update 1: Brian Krebs tells his side of the story – the only side I actually can believe without reservation.

I’ll let you all follow the links and read for yourselves. I expect we’ll see a lot more coverage on this one. In the meantime, best to err on the side of caution and assume that the site was compromised and that any information you provided may have been acquired.

Related posts:

  • “I’m Not Pro-Russia and I’m Not a Terrorist!” —- InfraGard and Airbus Hacker “USDoD” Unveils His New Campaigns
Category: Breach IncidentsBusiness SectorHackNon-U.S.Of Note

Post navigation

← New York woman pleads guilty to ID theft scheme
(follow-up) HuskyDirect.com site still down, some victims report fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people
  • Terrible tales of opsec oversights: How cybercrooks get themselves caught
  • International Criminal Court hit with cyber attack during NATO summit
  • Pembroke Regional Hospital reported canceling appointments due to service delays from “an incident”
  • Iran-linked hackers threaten to release emails allegedly stolen from Trump associates
  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.