Passwords in plaintext? NOT OK, Cupid
Australian dating security service not a good match, says privacy commissioner
“Encrypt passwords”: that's the message coming from Australia's privacy commissioner, at the conclusion of his investigation of the huge data breach of the Cupid Media dating operation in 2013.
The most serious breach was that “the compromised passwords were not salted or hashed, or otherwise encrypted, before the data breach. Instead they were stored insecurely, in plain text”, the commissioner's report states. “The Commissioner therefore found Cupid's storage of passwords in plain text to be a failure to take reasonable security steps”.
Finding that Cupid Media – which operated a network of 35 dating sites so as to cover niches of ethnicity, religion, sexual preference and location – had breached Australia's privacy regulations, the commissioner's report states: “Cupid had breached the Privacy Act by failing to take reasonable steps to secure personal information it held.”
During the investigation, the company told the commissioner it didn't hold credit card data, and asserted that since it doesn't check registrations to demonstrate that people are using real names, the data was less sensitive than (for example) financial information.
However, the investigation found that the preferences collected by the niche sites, along with e-mail addresses and user passwords that were compromised in the data breach, added up to breaches serious enough to bring the company under the remit of the Privacy Act.
Cupid also quibbled over the original reports that the breached database held 42 million user accounts, asserting that “this figure is not accurate because it includes 'junk' accounts and duplicate accounts”.
That, however, didn't satisfy the commissioner, who found that the company was retaining personal data that it didn't require: “ Cupid failed to take reasonable steps to destroy or permanently de-identify the personal information it held in relation to user accounts that were no longer in use or needed”, the commissioner writes.
The company did, however, co-operate with the investigation, notified its users, reset their passwords, and applied patches to fix the vulnerability. ®
Sponsored: Network DDoS protection