Hackers threaten to expose the user database of an Israeli LBGTQ dating site Hackers have taken the records from an LGBTQ dating site, used primarily by gay men, in Israel — threatening to expose its users unless they are paid.

Hackers threaten to expose the user database of an Israeli LBGTQ dating site

Hackers threaten to expose the user database of an Israeli LBGTQ dating site

  • Download
  • <iframe src="https://www.npr.org/player/embed/1051215567/1051215568" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

Hackers have taken the records from an LGBTQ dating site, used primarily by gay men, in Israel — threatening to expose its users unless they are paid.

AUDIE CORNISH, HOST:

Users of an LGBTQ dating site in Israel are on edge after a cyberattack there. Hackers have leaked some user data already and are threatening to expose more unless they're paid a million dollars. NPR's Daniel Estrin reports from Jerusalem.

DANIEL ESTRIN, BYLINE: The hacking group Black Shadow has hit Israeli websites before but none as personal as Atraf, Israel's most prominent LGBTQ dating site, used primarily by gay men. This weekend, the hackers leaked a sample list of 1,000 users, including cellphone numbers, email addresses, sexual preferences and HIV status. They leaked it on their channel on the messaging app Telegram and threatened to post the entire user database sometime Tuesday if they're not paid a ransom.

HILA PEER: And this is definitely a social crisis for the LGBTQ community in Israel.

ESTRIN: Hila Peer is with the Aguda, an Israeli LGBTQ advocacy group. They've been fielding calls from users whose data was exposed. And they've heard from users in the closet from communities not welcoming of their sexuality, afraid they could be next. Telegram has been trying to block the hackers' accounts at Israel's request.

PEER: So we're hoping Telegram will continue to cooperate with us 'cause this is really life-threatening for all those people potentially being outed.

ESTRIN: Gil Missing, spokesman of the cybersecurity company Check Point, says the Black Shadow hackers appear to be located in Iran.

GIL MESSING: Black Shadow uses a code that is duplicating or identical to codes that were used by attacks that originated from Iran. But it should be stressed that hackers that operated from Iran is not necessarily government entities or proxies of the government.

ESTRIN: Israel's cybersecurity directorate said it warned the dating site it was vulnerable. The company tells NPR they have not paid the hackers' ransom and are consulting the Israeli government about what to do next. The clock is ticking.

Daniel Estrin, NPR News, Jerusalem.

(SOUNDBITE OF MUSIC)

Copyright © 2021 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information.

NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record.