Feeds

Passwords in plaintext? NOT OK, Cupid

Australian dating security service not a good match, says privacy commissioner

Secure remote control for conventional and virtual desktops

“Encrypt passwords”: that's the message coming from Australia's privacy commissioner, at the conclusion of his investigation of the huge data breach of the Cupid Media dating operation in 2013.

Among the 42 million customers whose data was exposed in the breach of the Queensland-headquartered company were 245,000 Australians, privacy commissioner Timothy Pilgrim says.

The most serious breach was that “the compromised passwords were not salted or hashed, or otherwise encrypted, before the data breach. Instead they were stored insecurely, in plain text”, the commissioner's report states. “The Commissioner therefore found Cupid's storage of passwords in plain text to be a failure to take reasonable security steps”.

Finding that Cupid Media – which operated a network of 35 dating sites so as to cover niches of ethnicity, religion, sexual preference and location – had breached Australia's privacy regulations, the commissioner's report states: “Cupid had breached the Privacy Act by failing to take reasonable steps to secure personal information it held.”

During the investigation, the company told the commissioner it didn't hold credit card data, and asserted that since it doesn't check registrations to demonstrate that people are using real names, the data was less sensitive than (for example) financial information.

However, the investigation found that the preferences collected by the niche sites, along with e-mail addresses and user passwords that were compromised in the data breach, added up to breaches serious enough to bring the company under the remit of the Privacy Act.

Cupid also quibbled over the original reports that the breached database held 42 million user accounts, asserting that “this figure is not accurate because it includes 'junk' accounts and duplicate accounts”.

That, however, didn't satisfy the commissioner, who found that the company was retaining personal data that it didn't require: “ Cupid failed to take reasonable steps to destroy or permanently de-identify the personal information it held in relation to user accounts that were no longer in use or needed”, the commissioner writes.

The company did, however, co-operate with the investigation, notified its users, reset their passwords, and applied patches to fix the vulnerability. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.