In the aftermath of the Ashley Madison attack, numerous users reported receiving extortion and blackmail attempts.
Passwords were encrypted, but insecurely, and Leaked Source says it has managed to crack 99% of them.
For example, one person exposed in the hack is a 40-year old welder from a small Illinois town of a few thousand people.
He "will become anybody's slave" and lied about his age on the site, claiming to be 29.
Andrew Auernheimer, a controversial computer hacker who looked through the files, used Twitter to publicly identify Adult Friend Finder customers, including a Washington police academy commander, an FAA employee, a California state tax worker and a naval intelligence officer who supposedly tried to cheat on his wife.
Asked why he was doing this, Auernheimer said: "I went straight for government employees because they seem the easiest to shame." Millions of others remain unnamed for now, but anyone can open the files -- which remain freely available online.
Back in May 2015, news broke that it was breached, albeit on a smaller scale — 3.9 million user accounts were circulating online.
Adult Friend Finder asks customers to detail their interests and, based on those criteria, matches people for sexual encounters.
Significantly less information about users has been leaked, however — while Ashley Madison included everything from photos and sexual preferences to addresses, the Friend Finder breach is limited to more basic information like email addresses, passwords, and registration dates.
That said, given the nature of the sites affected, it has the potential to be compromising to some users if the data starts circulating widely.
On the forum, hackers immediately praised ROR[RG], saying they were planning on using the data to attack the victims.
"i am loading these up in the mailer now / i will send you some dough from what it makes / thank you!!
It's not clear who was behind the attack, though Leaked Source says it occurred in October 2016.