IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Hackers steal 8.3 million user records from 123RF

Stolen data contained users’ names, addresses, hashed passwords

Data Breach overlaying a circuitboard

Hackers have stolen 8.3 million user data records from royalty-free stock photo website 123RF. The cyber criminals breached a server belonging to 123RF’s parent company, Inmagine Group, to access the data.

According to a report from Bleeping Computer, a known data breach broker began selling the data containing user information last weekend. The data reportedly includes 123RF members' full names, email addresses, MD5 hashed passwords, company names, phone numbers, addresses, PayPal emails and IP addresses. However, it’s not thought to contain financial information, such as credit card numbers.

Inmagine Group said: "We are actively notifying the necessary authorities and 123RF.com members to work with them to remedy the situation. We are also tightening the security policies to include tighter passwords and IP detection to combat suspicious log-ins."

"Our security infrastructure is always under a constant state of security testing, penetration, and development, especially in the past year. We wish to reiterate that we take the privacy and data of our customers seriously and have at all times been vigilant with the handling of our customer’s data."

Chris Hauk, consumer privacy champion at Pixel Privacy, told IT Pro that the state of online security makes New York City in the early 1970s look safe by comparison. He added that while passwords were encrypted, hackers could use online password cracking tools to retrieve credentials for many accounts. 

“This means that 123RF members that reused that same password on another site(s) are in danger of having those accounts accessed. So, this brings an added bit of urgency to the usual ‘change your password and check to make sure none of your online accounts use the same password’ advice,” Hauk said.

Niamh Muldoon, senior director of trust and security at OneLogin, told IT Pro that it’s unclear how this breach occurred in the first place; however, what is known is the information is out there, and cybercriminals are likely already taking advantage of it.

“The MD5 hashed passwords are easily hacked, for instance, so they will likely carry out credential stuffing attacks to access other user accounts. Affected individuals would do well to change all passwords immediately, particularly if the same password was used for their PayPal account. A password manager would be useful as well to ensure that passwords are no longer reused across services and to help with crafting long and complex passwords,” Muldoon said.

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Recommended

Best free malware removal tools 2022
Security

Best free malware removal tools 2022

22 Jun 2022
A guide to cyber security certification and training
Careers & training

A guide to cyber security certification and training

16 Jun 2022
What is shoulder surfing?
social engineering

What is shoulder surfing?

10 Jun 2022
CIAM buyer’s guide
Whitepaper

CIAM buyer’s guide

6 Jun 2022

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022
Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022