DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Formspring Also victim to hackers leaking data after being hacked via dev site

Posted on July 14, 2012 by Lee J

Yet another website has come out this month and announced that they are investigating a breach which has resulted in leaked data. The company is Formspring and this come as Yahoo, Nvidia and other high profile targets have been hacked.

Formspring is the place where you can share your perspective on anything. Members express their point of view and personality through engaging conversations and interact with friends, followers, and people they just find cool. more

Formspring announced on the 12th that they have started an investigation to a possible breach and not long after they updated that to a confirmation as well as a bit of information into the leaked data. The confirmation has been made via a unknown security forum which contacted Formspring after the leaked data was posted there, after they did checks and confirmed the data was in fact true they locked down and started figuring out whats going on. It turns out that the hackers have obtained access to a live production database via a development server which was exploited. Formspring claims to fo updated this security hole and upgraded  the encryption to bcrypt. Latest update from FormSpring> UPDATE: SECURITY BREACH RESOLVED We wanted to give an update that the security breach was resolved today and provide background on what happened. We were notified that approximately 420k password hashes were posted to a security forum, with suspicion from a user that they could be Formspring passwords. The post did not contain usernames or any other identifying information. Once we were able to verify that the hashes were obtained from Formspring, we locked down our systems and began an investigation to determine the nature of the breach. We found that someone had broken into one of our development servers and was able to use that access to extract account information from a production database. We were able to immediately fix the hole and upgraded our hashing mechanisms from sha-256 with random salts to bcrypt to fortify security.  We take this matter very seriously and continue to review our internal security policies and practices to help ensure that this never happens again. We wanted to provide feedback to questions we are seeing come through our support desk: – If you have not yet received an email asking you to reset your password, make sure you are checking the email account of the email you registered with on Formspring.  Also check your Spam folder.  If you still don’t see the email or no longer have access to that email address, contact our support team at https://formspringme.zendesk.com/anonymous_requests/new and they’ll take care of it.

  • If you have linked Facebook to your account, you can safely use Facebook Connect to log in.  However, we recommend that you change your Formspring password if you’ve previously created one.

Should you have any further questions, please contact [email protected].

Category: Breach Incidents

Post navigation

← Nvidia shuts down forums after suspicious activity
300+ Pakistani Sites Hacked and Defaced By Pr4th4m & Jaguar →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.