September 25, 2018
September 20, 2018
Posted July 28, 2015
Line in Hank Williams’ Country Classic Sums It Up for Some Looking to Cheat on Significant Others on Hacked AshleyMadison.Com
What’s AshleyMadison? According to the website, it’s “the world’s leading married dating service for discreet encounters.” The site says it has 37,610,000 anonymous members – who may not be all that anonymous anymore.
Having an Impact
The Impact Team (a hacker or group of hackers) gained access to Avid Life Media (ALM), the company that owns online sites AshleyMadison, Cougar Life and Established Men and threatened to expose the personal information of millions of users.
What the hackers want
To refrain from publishing the compromised and compromising information, the hacker(s) demand ALM “take Ashley Madison and Established Men offline permanently in all forms, or we will release all customer records, including profiles with all the customers’ secret sexual fantasies and matching credit card transactions, real names and addresses, and employee documents and emails. The other websites may stay online.”
The Impact Team’s agenda
There are more questions than answers when it comes to the reasons for the hack. Is the Team comprised of moralists who can’t stand the idea of people cheating? In the demand to shut down the site, men who used it were referred to by the hacker(s) as “cheating dirtbags.” Is online privacy the issue? “[ALM] promised secrecy but didn’t deliver.” Is it to embarrass people, especially people with clout? “[A] significant percentage of the population is about to have a very bad day, including many rich and powerful people.” Is it a combination of the three? Or is there a hidden motive?
KrebsOnSecurity is on the case
Security guru Brian Krebs discusses what was learned when ALM CEO Noel Biderman was contacted by KrebsOnSecurity and offers more information on a host of topics having to do with the breach from the $1.7 million ALM reportedly netted from promising to fully delete users’ information to the company having a prime suspect in its sights. You may find the complete KrebsOnSecurity piece by clicking on this link.