CRITICAL SEVERITYAdult

Adult FriendFinder Data Breach

Verified by ObscureIQ Intelligence

8.0Severity
220.0MRecords
4Data Fields
2016Year

Impact & Downstream Threats

This breach carries critical risk due to the nature of exposed data fields and the scale of affected records.

Primary downstream threats:
  • Credential stuffing against reused passwords across other platforms
  • Targeted phishing campaigns using exposed email addresses

Breach Intelligence

EntityAdult FriendFinder
OrganizationPrivate Company • USA
Breach DateOctober 2016
DisclosureDecember 2024
Records Exposed~220.0M
Attack VectorMisconfiguration
SourceHave I Been Pwned / DataBreach.com / ObscureIQ intelligence
StatusConfirmed

Executive Summary

On 16 October 2016, Friend Finder Networks (FFN) – operator of AdultFriendFinder.com, Cams.com, Penthouse.com, Stripshow.com and iCams.com – suffered one of that year’s biggest breaches. Breach-notification service LeakedSource obtained a dump containing 412 million account records, about 339 million of them tied to AdultFriendFinder alone. What was stolen? Attackers exfiltrated usernames, email addresses, IP logs, spoken-language settings and passwords. Troublingly, 99 percent of passwords were stored either in plain text or with unsalted SHA-1, making them easy to crack. Analysts also uncovered 15 million “deleted” profiles that FFN had never actually removed. How the intruders got in: Forensic reviews point to a Local File Inclusion (LFI) vulnerability in an FFN web application. Exploiting the flaw let attackers read configuration files and pivot into production databases, siphoning two decades of registrations in one hit.​ Scope by the numbers: While 412 million rows were leaked, , w, e counted ≈219 million unique email addresses after deduplication – many users kept multiple profiles and “deleted” rows were still present. The dataset was traded privately on underground forums before landing in public breach-notification services in February 2020.​ Immediate fallout: Soon after disclosure, cracked credential lists circulated widely, fuelling credential-stuffing attacks on mainstream sites and a rush of sextortion spam citing AdultFriendFinder membership. Privacy advocates stressed that, unlike retail leaks, the exposure risked blackmail and involuntary outing of users’ sexual preferences.​ Company response: FFN said it “immediately engaged external security experts,” forced network-wide password resets and moved new credentials to bcrypt hashing, yet critics argued the steps were reactive and left long-standing patch-management and data-retention issues unresolved.​ Ongoing significance: FFN’s public statement on 14 November 2016 confirmed​ a security investigation but offered no detailed breakdown, leaving customers dependent on researchers for clarity. No payment cards were exposed – billing is outsourced – yet time-stamped IP addresses and login histories gave attackers a granular view of user behaviour. In October 2016, the adult entertainment company Friend Finder Networks suffered a massive data breach. The incident impacted multiple separate online assets owned by the company, the largest of which was the Adult FriendFinder website alleged to be "the world's largest sex & swinger community". Exposed data included usernames, passwords stored as SHA-1 hashes and 170 million unique email addresses. This incident is separate to the 2015 data breach Adult FriendFinder also suffered. The data was provided to HIBP by dehashed.com. As this breach has been flagged as sensitive,it is not publicly searchable. To see the exposure of email addresses in this breach, sign in to your dashboard and review results for your email address in the "Breaches" section under "Personal", or search any domains you control in the "Domains" section under "Business".

About Adult FriendFinder

Adult-oriented dating and entertainment platform.

Private CompanyUSAfriendfinder.com

Data Points Exposed

Verified fields in the released dataset:
Email addresses
Passwords
Spoken language
Usernames

Dark Web Verification

Status: Confirmed

  • Dataset containing approximately 220.0M records identified in breach intelligence sources.
  • The data is indexed and searchable across breach notification platforms.

Recommended Actions

⚠️ Do not assume this is low sensitivity.

Change Passwords
Change your Adult FriendFinder password immediately and any account sharing similar credentials.
Expect Targeted Phishing
Watch for emails referencing this breach. Verify communications through official channels.
Secure Email & Enable MFA
Email compromise is often the first pivot point. Enable multi-factor authentication.
Monitor Financial Accounts
Watch for unauthorized credit applications and suspicious activity.
Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.
Non-clients may request a breach impact review.

Frequently Asked Questions

What happened in the Adult FriendFinder data breach?

In October 2016, Adult FriendFinder experienced a data breach that exposed approximately 220.0M records containing personal information.

What data was exposed?

The exposed data includes fields such as email address, password, spoken language, username.

How many records were affected?

Approximately 220.0M records were affected based on current breach intelligence.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of Adult FriendFinder
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

MisconfigurationAdultEmailPasswords

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom