Breaking News

Cheating site Ashley Madison hacked, 37 million users at risk

Nearly 37 million users of the cheating site Ashley Madison are at risk of having their data leaked online, including financial info and sexual fantasies.

The popular online cheating site Ashley Madison has been hacked, and a big amounts of data was stolen by hackers who posted part of this information online as proof of the attack.

The hackers affirm that they have completely compromised the Ashley Madison company and have the users’data, including financial records, and many other personal information.

It has been estimated that around 37 million users are in risk of seeing their affairs and fantasy exposed to the public, if all the information owned by hackers is leaked.

Until the moment the only data released, was uploaded by a hacker (or hackers) calling itself “The Impact Team,” the archive includes internal the data stolen from Avid Life Media (ALM), which is the company that owns the Ashley Madison, and other similar sites like Cougar Life and Established Men.

The popular investigator KrebsOnSecurity reached Noel Biderman, the ALM Chief Executive, for a comment and he confirmed that the company systems were hacked. Biderman added that the company is “working diligently and feverishly” to take down ALM’s intellectual property. KrebsOnSecurity verified that many of the links published by the Impact Team were no more working.

“We’re not denying this happened,” “Like us or not, this is still a criminal act.”said Biderman.

Due to an ongoing investigation, Biderman hasn’t provided further details, the man pointed out someone who once upon a time had access to the company’s network, like a former employee or a contractor:

“We’re on the doorstep of [confirming] who we believe is the culprit, and unfortunately that may have triggered this mass publication,”, “I’ve got their profile right in front of me, all their work credentials. It was definitely a person here that was not an employee but certainly had touched our technical services.”

The hackers compromised not only users of the Ashley Madison website, they leaked maps of ALM’s servers, employee account information, salary details, company banks, all the type of information that can compromise the company business.

In May AdultFriendFinder, another dating website, has been breached by hackers that leaked data online.

The Impact Team released a manifesto online, referring about the stolen ALM data and arguing that ALM was lying to their customers because ALM told them there was a service that allowed members to erase their profile info for a fee ($19).

Hackers said that the profile’s “full delete”, in which is offered “removal of site usage history and personally identifiable information from the site,” it isn’t true and nothing is deleted.

“Full Delete netted ALM $1.7mm in revenue in 2014. It’s also a complete lie,” “Users almost always pay with credit card; their purchase details are not removed as promised, and include real name and address, which is of course the most important information the users want removed.”

But the hackers have a demand that want to see fulfill:

“Avid Life Media has been instructed to take Ashley Madison and Established Men offline permanently in all forms, or we will release all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails. The other websites may stay online.”

For what is known until the moment, the Impact Team only release a small percentage of the data they stole, but it’s possible that they will be release the entire archive if their requests are not fulfilled, meaning that Ashley Madison needs to shut down.

Impact Team added in their statement:

“Too bad for those men, they’re cheating dirt bags and deserve no such discretion,” “Too bad for ALM, you promised secrecy but didn’t deliver. We’ve got the complete set of profiles in our DB dumps, and we’ll release them soon if Ashley Madison stays online. And with over 37 million members, mostly from the US and Canada, a significant percentage of the population is about to have a very bad day, including many rich and powerful people.”

The circumstance suggests that hackers have a deep knowledge of the company, he also left a message to the directory of Security Mark Steele:

“Our one apology is to Mark Steele (Director of Security),” “You did everything you could, but nothing you could have done could have stopped this.”

Stay Tuned!

About the Author Elsio Pinto

Elsio Pinto is at the moment the Lead Mcafee Security Engineer at Swiss Re, but he also as knowledge in the areas of malware research, forensics, ethical hacking. He had previous experiences in major institutions being the European Parliament one of them. He is a security enthusiast and tries his best to pass his knowledge. He also owns his own blog http://high54security.blogspot.com/
[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Ashley Madison, cybercrime)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts warn of an ongoing malware campaign targeting WP-Automatic plugin

A critical vulnerability in the WordPress Automatic plugin is being exploited to inject backdoors and…

8 hours ago

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

10 hours ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

11 hours ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

13 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

15 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

1 day ago

This website uses cookies.