Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/18/2015
08:25 PM
50%
50%

Hackers Dump Ashley Madison User Database... Where Most People Won't Find It

Attackers make good on doxing threat, but post database to dark web.

The attackers who compromised Ashley Madison -- an online hook-up site for people looking for extra-marital affairs -- have made good on their threats to unmask the site's users if the site was not taken down. However, unlike the attackers who doxed Sony and Hacking Team, who uploaded all the stolen data to Pastebin, the Ashley Madison hackers dropped the 9.7 G data dump where most users will not go looking: the "dark web," only accessible through the Tor network.

The data includes email addresses, credit card transaction data, and profile information on the 37 million customers of Avid Life Media, which includes Ashley Madison and its sister sites, Cougar Life and Established Men. 

The attackers, who call themselves Impact Team, said "We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data. ... Find yourself in here? It is ALM that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends."

“This is definitely a unique cybercriminal act, one that I'm sure is very controversial amongst readers. But what’s more worrying is what they are not releasing and instead using as blackmail," says George Anderson, director of product marketing at Webroot. "I don’t think this is just a sophisticated ‘kiss ‘n tell.’ There is a desire to hurt people here and that’s sick as well as being criminal.

"Whilst readers' morals may conflict either seeing this group of hackers as good or bad guys, the fact remains that the Impact Team illegally obtained sensitive personal info," says Anderson. "I’d imagine the fall-out is divorces, firings and blackmail – really personally malicious and upsetting stuff. There are no moral judgments on this except the immorality of hackers. So the ‘what now?’ is pretty nasty and the site users will probably be considering a class action for negligence."

See more on Wired.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
sigp220
0%
100%
sigp220,
User Rank: Apprentice
8/19/2015 | 4:09:54 PM
AM Hackers did a service.
I couldn't disagree with you more. While I can understand that the hackers taking down AM weren't being wthical, the greater crime was the sleaze and knowing complicity of the AM management and leaders. The users and the management of AM got what they diserved.

If I made a site to aid bank robbers, no one would think twice if I was hacked and taken down. I feel the same way about the AM site. The people using it were committing crimes, they were hurting other people, they were unethical sleazes. The AM management were specifically doing this as well as committing fraud.

I think both groups got just what they deserved.
SamArv
100%
0%
SamArv,
User Rank: Apprentice
8/20/2015 | 12:24:50 PM
Re: AM Hackers did a service.
I'm sorry, you clearly don't know what you're talking about.

First: how were people registered at the AM site committing crimes?? Which crime?

Second: how were they hurting other people and unethical sleazes? 

I signed up for AM when I was SINGLE. This wasn't a site just for people who were married. Many of the women I spoke with were either divorced or separated or had full understanding of their spouse for being on the site.

You don't know anything about these people, yet you've decided -- with all the smugness and moral sanctimony of your typical ignorant fool -- that everyone on this site somehow deserves "what they get."

Who hell are you? Pull your head out, shake the crap from your brain, and try to understand that your misconceptions about all the "evil" that was going on at AM.....wasn't really. At least for a lot of people -- a lot of people who will be hurt by this.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/16/2015 | 1:02:36 PM
Re: AM Hackers did a service.
@SamArv

Your post was very informed. AM is not soley for married or in relationship individuals.

However, lets not resort to adding to the hatred within the previous post. The post you responded to was ignorant and I understand your frustration but lets rise above it. We should be sharing information and thoughts here respectfully.

 
BobT144
50%
50%
BobT144,
User Rank: Apprentice
9/14/2015 | 12:33:49 PM
Re: AM Hackers did a service.
AM site was not a criminal site. Your views are deluded, and your comments moot. 
BobT144
50%
50%
BobT144,
User Rank: Apprentice
9/14/2015 | 12:33:53 PM
Re: AM Hackers did a service.
AM site was not a criminal site. Your views are deluded, and your comments moot. 
Anti_Slime
100%
0%
Anti_Slime,
User Rank: Apprentice
9/15/2015 | 11:59:13 AM
Re: AM Hackers did a service.
I hope these assholes are identified and executed for their crimes invading people's privacy for their bullshit excuses mechanism... Maske sure they can never do this again and execute them immediately.
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15943
PUBLISHED: 2019-09-19
vphysics.dll in Counter-Strike: Global Offensive before 1.37.1.1 allows remote attackers to achieve code execution or denial of service by creating a gaming server and inviting a victim to this server, because a crafted map is mishandled during a memset call.
CVE-2019-16413
PUBLISHED: 2019-09-19
An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.
CVE-2019-3738
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
CVE-2019-3739
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
CVE-2019-3740
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.