Is Ashley Madison Hack Story More About Cybersecurity Or Infidelity?
The story for infidelity website AshleyMadison.com keeps getting worse, as hackers that accessed a large amount of user data last month made good on threats to make the information public on Tuesday by posting it online. Further they added that Ashley Madison’s full paid-delete feature promises removal of site usage history and personally identifiable information from the site, but users’ purchase details (credit card details), including real name and address, are not erased.
It is understood 9.7 gigabytes of data including card, account details and log-ins, have been dumped on the dark web, which is accessible by a covert internet browser.
Hackers have released stolen information from some 32 million users of the affair website Ashley Madison, security experts said Wednesday.
Avid Life Media, a Canadian-based company, owns both websites. “Now everyone gets to see their data”, Impact Team said.
Others contacted by The Telegraph said they had been the victims of identity fraud and would now have to explain to their partners or bosses at work that they were innocent parties. In an post published anonymously on Tuesday, captioned “Time’s Up!”, the hackers said they were releasing Avid Life Media’s data because the company had not met their demands.
Users of adultery site Ashley Madison beware: some of your personal information may be viewable online.
This data leak comes after the hackers already stole and leaked online user data on millions of accounts from dating site Adult Friend Finder.
A group of hackers disclosed the emails of millions of Ashley Madison cheating website users, among which are some high profile world leaders.
Avid Life Media responded by condemning the release of the data. It was ALM that failed you and lied to you. Chances are your man signed up on the world’s biggest affair site, but never had one. If that distinction matters.
In a declaration for KrebsOnSecurity, ALM Chief Executive Noel Biderman said the company was “working diligently and feverishly” to recover ALM’s intellectual property.
This week, the records began surfacing, including 15,000 accounts that used military or government domains, according to a blog by Salted Hash-Top Security News and others.
The leaked data includes names, addresses and phone numbers, but Wired.com noted it is unclear if members provided legitimate information.