Eharmony Password Dump Sites
EHarmony, the popular online dating site, was the target of a password hacking attack that resulted in 1.5 million stolen passwords, most of which have been cracked. The attack is believed to be by the same hacker who stole 6.5 million passwords from LinkedIn, the career-oriented social network.
ALL FALL DOWN — eHarmony confirms its members’ passwords were posted online, too Vague post leaves unanswered questions about dump of 1.5 million passwords. Jun 05, 2012 EHarmony, the popular online dating site, was the target of a password hacking attack that resulted in 1.5 million stolen passwords, most of which have.
The hacker posted two lists containing the 8 million passwords on the website insidepro.com, on which the user goes by the name of 'dwdm.' The larger list contained some passwords LinkedIn has now confirmed as belonging to its social network. And a significant number of the passwords on the smaller list contained the words 'eHarmony' or 'harmony,' according to. EHarmony has confirmed that some of its passwords were stolen. The company announced the news in a blog, but did not say how many passwords were stolen.
The dating site reset passwords for compromised accounts and emailed those users with instructions on how to reset their passwords. The user posted the list of hashed passwords online and asked peers for help cracking them. The passwords were not salted - which is an extra form of security that can be added on top of hashing passwords - allowing dwdm's peers to help crack the vast majority of the passwords. Ars Technica reports that only about 98,000 passwords are still secure.
Ars Technica reports that the lists only contains passwords and not actual logins, which makes the passwords useless even if cracked, but in all likelihood, the hacker also has the logins. If you are a user of LinkedIn or eHarmony, your best bet is to change your password.
Dating Advice
If you also use the same login/password combination for any other sites, the most secure thing you can do is change your password on those sites as well. RELATED: Follow Salvador Rodriguez on,.
Wait a Minute, Why Is This Tool Safe? You already changed your password, right? You no longer use that old password anywhere else, right? If not please make sure you do that first.
The above tool asks you to enter your eHarmony password, and then computes its MD5 hash and sends the result to LastPass.com to search the list of leaked password hashes. A hash is a mathematical function that is simple to perform in one direction, but very difficult to reverse. Meaning, the tool will convert your password into a series of characters in such a way that it will be very difficult to re-construct your original password. Only the hash of your password will be sent to LastPass.com's servers, not your actual password. This hash will not be stored or logged at all.
Please view source the page if you're technically inclined. Note that if you used a simple password, such as one based on dictionary words, then it might be possible to reconstruct your original password. This is what all of the concern is about: the hashes of simple passwords can be easily reconstructed to reveal the original actual password. I just want to see how it works. We encourage you to see just how bad the leaked passwords are. For inspiration: Speedate or testdate. It appears that eHarmony was uppercasing all passwords before hashing so we're doing that too.
Warez Password Dump
So what should I do now? After you've updated your eHarmony password, start better managing your online life with LastPass. LastPass will help you store all of your usernames and passwords in one secure, central location. You can update old passwords with randomly generated ones, and let LastPass do the work of remembering them and filling them for you.