Friday, March 21, 2025
HomeCyber AttackOpenSubtitles Hacked - Over 7 million Subscribers Email, IP Addresses & Usernames...

OpenSubtitles Hacked – Over 7 million Subscribers Email, IP Addresses & Usernames Leaked

Published on

SIEM as a Service

Follow Us on Google News

On January 18, opensubtitles.org, one of the largest subtitles websites, faced a data breach. OpenSubtitles posted on their forum that they were contacted by a hacker on telegram in August 2021.

It seems like the hacker was able to breach their server and get sensitive information. As every cybercriminal does, the hacker also asked for a ransom so as not to disclose the data. 

The data consisted of usernames, emails, passwords and much more. The hacker also promised that he would delete the data after he received the ransom. With not many options, Opensubtitles agreed to it. The hacker explained how he hacked.

The attacker was able to crack the weak password of a SuperAdmin which allowed him to access an unsecured script.

The script which was used only by SuperAdmins, created the way for SQL injections and data extraction. After providing the information, he also helped them to solve the error. The worst part is the hacker exposed their data.

As posted in the forum,

“The site was created in 2006 with little knowledge of security, so passwords were stored in md5() hashes without salt. It means if you used a strong password (let’s say at least 10 characters with the lowercase, uppercase, number and special characters) you should be safe, but short easy passwords, especially if they are in the English dictionary can rather easily be extracted from these data.”

The post also said that they felt amazing, as it had been 15 years since the site was created and the hacker must’ve had a hard time cracking it. OpenSubtitles became a victim of cyber fraud which made them learn a lesson that, if they are contacted by a hacker, there should be minimum talk and should not believe in false promises.

They have realized the mistake of ignoring the need for security on their website. They also apologized for their mistake and advised their users to use a strong password. They explained further about their updates and issues to be fixed.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government...

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through...

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan,...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

I-SOON’s ‘Chinese Fishmonger’ APT Targets Government Entities and NGOs

In a recent development, the U.S. Department of Justice unsealed an indictment against employees...

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North...

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted...