eHarmony Leak – 1.51 Million Passwords

Well with little sleep to go on I keep reading the articles from the supposed LinkedIn hack.  There was a lot of incomplete information floating around yesterday.  To start off with these hashes were posted on a forum (we all know this already) but the “hacker” was asking for help to crack the hashes … and from what I see, not gloating about a LinkedIn hack.

What else do we see?  Well it was another user on the forum that pointed out the suspicious connection to LinkedIn. All of this from the forum at  The page looks to be the main thread of the LinkedIn hashes (thanks to Google Cache for keeping this) but has deleted the thread for obvious reasons.  Just do a little Google hacking and you should be able to see it all for yourself.  Start with “dwdm” linkedin and your cache awaits.

Now there is also one thing that the majority of tweets and blog posts overlooked yesterday. apparently also got nailed in this hack when apparently someone else made a connection to eharmony in another hash list posted by the same guy (dwdm).

“Experts said that the fact that some of the passwords included the phrase “eHarmony” indicated they were taken from the online dating website, which has more than 20 million members worldwide.” –  The smaller of the two lists is a wee bit different.  The hashes are not SHA1 but MD5.  This does indicate that the hashes are from a different source.

This is a little piece of one of the “cracked” lists that was posted on the forum for this file.


So what does eHarmony have to say about all this? Well pretty much the same public relations BS that LinkedIn spewed out. If you want to read the propaganda it is right here  So basically the procedure here is to calm the users down, wait out the storm, and hopefully everyone forgets about it the next time Sony gets hacked.  REALLY!?  As users of these services are we not entitled to a full explanation of the exploit, what was done to repair it, and what will be done to prevent further issues?  This really pisses me off as a LinkedIn user, because they are now probably all sitting back thinking that they have dealt with the issue.  Sure from a people point of view you have, but what about the underlaying technology that is the root cause?  We will never hear about it I am sure.

Well with this new information, and other articles that I have read on the net … maybe these hashes are from and  OK maybe I was wrong, and the two sites did get hacked.  One thing I am still skeptical about though is who hacked the sites, and how did this dwdm guy get his/her hands on the hashes?  Surely anyone who can hack these sites and dump the hashes would know how to download a rainbow table and go to town … right?

So once again I start to think a little.  Where did these hashes come from?  Well as most of us all know the internet goes way beyond the reaches of Google into the digital abyss where you can buy anything, and I mean ANYTHING!  I will not go into details here about how to dive into this world because many have already done it.  One great example is this article  So maybe our friend dwdm had some bitcoins just laying around and came across a K-Mart blue light special on hash files.  You know buy the LinkedIn hashes and get the eHarmony hashes for FREE!  Probably not the case, but has it come to the point where “hackers” can break into a web site and don’t know jack about cryptography?

Sure I can sit back and rant and rave about how these guys and gals don’t know everything … but neither do I … or anyone for that matter.  What I can say though is if they were not publicly available I wouldn’t be touching those files with a 10 foot pole!  These people have got balls.  Now if they do this out of curiosity, or if they have malicious intent it doesn’t really matter.  What does matter is the outcome of this.  What have we all learned?

1.  Storing passwords using SHA1 isn’t good enough anymore LinkedIn
2.  Really eHarmony MD5 Passwords are no better
3.  Hackers like any other group will work together to reach a common goal
4.  The public has been schooled a little bit on passwords … MAKE ‘EM LONG!
5.  Most importantly eHarmony, and LinkedIn are now aware that they have a problem, and the public knows it too.  They have to fix it.
6.  Other web sites and companies should learn from LinkedIn’s, and eHarmony’s mistakes and fix their crap before it’s too late.

See if your eHarmony Password was Stolen

Once again I have been so nice and setup a (fairly ugly) PHP app for people to check if their eHarmony password was in the MD5 hash list. So go try it now [link removed]!

See if your LinkedIn Password was Stolen

I have created a simple PHP page that hashes your password and searches the hash list that I downloaded from and lets you know if your password was one of the 6.5 million Start [link removed]!

Leave a Reply

All Work on this site is not to be reproduced without written permision from Nick Schroedl.