Threat Actor: Black Shadow (originated from Iran), Russian hacker
Victim: Atraf (Israeli LGBTQ dating app) users
Information:
– Atraf, a popular Israeli LGBTQ dating app, has suffered a major data breach
– The data breach exposed personal information of over half a million users
– The group responsible for the attack, Black Shadow, originated from Iran
– The data breach occurred after compromising an Israeli hosting service named CyberServe
– A user on Breach Forums, apparently of Russian origin, claims to have leaked the Atraf database
– The leaked database contains the personal data of over 1.5 million users, but after removing duplicates, the total number of leaked accounts decreases to over half a million (669,672)
– The leaked records date back to 2021, suggesting that the data might be legitimate
– The leaked information includes full names, nicknames, country, city, age, height, religion, address, phone numbers, IP addresses, date of birth, interests and hobbies, sex and gender, sexual orientation, email addresses, plain text passwords for some users, location coordinates, type of smartphone and operating system, conversations in direct messages (DMs), family details including if they have children or not, and payment card data (excluding card numbers but including CVV codes, expiry dates, and card types)
– The leaked data poses a significant threat to the privacy and physical security of affected users
– It can result in online harassment and hacking of email accounts
– Atraf users are advised to change their passwords immediately for both their email and Atraf account
– Caution should be exercised with emails purportedly from Atraf and double-check before clicking any links
– Hackread.com has notified Atraf about the breach and seeks their official response
Atraf, a popular Israeli LGBTQ dating app, has suffered a major data breach exposing personal information of over half a million users – Leaked data includes clear text password and payment card data – Atraf users are advised to change their passwords immediately!
In November 2021, Hackread.com reported a ransom failure leading to the data leak of some Israeli LGBTQ dating app Atraf users. The group responsible for the attack, Black Shadow, originated from Iran. They demanded a ransom of $1 million after acquiring the app’s data by compromising an Israeli hosting service named CyberServe.
Now, a user on Breach Forums, apparently of Russian origin, claims to have leaked the Atraf database, containing the personal data of over 1.5 million users. However, Hackread.com has analyzed the 2.63 GB worth of data, which appears legitimate. After removing duplicates, the total number of leaked accounts decreases to over half a million, precisely 669,672.
It’s worth noting that the Atraf database was leaked twice in 2023 on the same forum. However, neither of these leaks contained clear text passwords or sensitive personal information like the latest one.
It’s important to note that the data breach remains alleged until official confirmation from the company. Meanwhile, our analysis reveals a treasure trove of personal and sensitive information, primarily from Israeli users. This information includes:
- Full names
- Nicknames
- County
- City
- Age
- Height
- Religion
- Address
- Phone numbers
- IP addresses
- Data of birth
- Interests and hobbies
- Sex and Gender
- Sexual orientation
- Email addresses
- Plain text passwords for some
- Location coordinates
- Type of smartphone and operating system
- Conversations in direct messages (DMs)
- Family details including if they have children or not
- Payment card data excluding card numbers but including CVV codes, expiry dates, and card types (Master/Visa).
- And much more…
Hackread.com can confirm that the leaked records date back to 2021, with no recent records. The timeline aligns with the claims made by Black Shadow in November 2021, suggesting that the data might be legitimate.
Nevertheless, this data breach poses a significant threat to the privacy and physical security of affected users. It can result in online harassment and the hacking of email accounts, as the breach includes clear text passwords.
If you are an Atraf user, you must immediately change the passwords for both your email and Atraf account. Additionally, exercise caution with emails purportedly from Atraf and double-check before clicking any links, as they could be attempts by cybercriminals to compromise your data further or infect your device with malware.
Hackread.com has notified Atraf about the breach, seeking their official response. If you have any concerns about your data, you can also contact Hackread.com at [email protected].
RELATED TOPICS
- Anonymous Sudan’s DDoS Attacks at Israeli BAZAN Group
- Hackers Target Israeli Rocket Alert App Users with Spyware
- Israeli El Al Sys Hackers Hit Flights in Mid-Air Hijack Attempt
- Hackers Defaces Israeli-Made Equipment at US Water Agency
- Iran’s MuddyWater Group Hit Israelis with Fake Memo Phishing
- Hamas Hackers Hit Israelis with New BiBi-Linux Wiper Malware
Source: Original Post