A hacking group calling itself 'LulzSec Reborn' has posted 170,937 names, usernames, passwords and email addresses of a military dating site's members.
According to thehackernews.com, the credentials were posted as part of 'Operation Digiturk'. A response from MilitarySingles.com said there was "no actual evidence" it had been hacked and suggested that the claims were false. The attackers responded by defacing the site and revealing that email addresses from the US army, navy and Microsoft had been posted online.
Graham Cluley, senior technology consultant at Sophos, said: “Email addresses, usernames, real names and – in some cases – physical addresses belonging to romance-seeking members of the military were included in the haul of information posted on the internet.
“If you know anyone who has ever used the Military Singles website, it would be a good idea to tell them to change their password as a precaution and to ensure that they are not using the same password anywhere else.”
A video appeared last week suggesting that LulzSec would return on April Fools' Day and that the recent arrests had "merely disrupted the active faction".
“Of course, on the internet, anyone can claim to be whatever they want and so it's not particularly surprising to see that it was a group calling itself LulzSec Reborn that posted a message on PasteBin announcing the hack of MilitarySingles.com,” Cluley said.