SextPanther Exposes Model IDs

January 25, 2020 Uncategorized

SextPanther exposes thousands of model IDs, photos from sexting sessions

Sexting site SextPanther has exposed the identification documents of thousands of models, along with explicit images sent and received by models during their SMS messaging sessions with customers. As reported by TechCrunch, the data was found on an unsecured Amazon Web Services “storage bucket”–the same issue behind the recent PussyCash data exposure. The SextPanther incident comes just a week after it was revealed that an IWantClips employee emailed confidential tax information to a contact outside the company.

The exposed information was discovered by a cyber-security company, and included documents such as driver’s licences and passports for over 11,000 models, as well as over 100,000 explicit photos and videos sent and received by models during sexting sessions.

Response from SextPanther’s Twitter account:

We are aware of the article published regarding a potential security breach with SextPanther data. Our security and legal teams are still investigating but at this time there is no evidence of SP data being accessed with the exception of the security firm that found the exploit and informed the media.

The vulnerability was fixed within one hour of being notified. Once we have more information, we will be providing that directly to the models that were affected. We have the access logs and our security team is still investigating.

At this point there is no evidence of third-party access besides the security firm. We will inform models who were potentially affected as that information becomes available to us.

Related articles