Hackers Threaten to Expose 37 Million Cheating AshleyMadison Users

90-95% users are male. They got a nice little racket going on.

That's how these sites get you. They have employees message you and goad you into paying for a subscription. Cougar life was in the news for doing just that.

This big for a number of reasons and extremely reckless by the hackers. There were a number of Saudi e-mail addresses in the dump and in that country you face death for infidelity. If people are killed behind this, these hackers have blood on their hands.
 
That's how these sites get you. They have employees message you and goad you into paying for a subscription. Cougar life was in the news for doing just that.

This big for a number of reasons and extremely reckless by the hackers. There were a number of Saudi e-mail addresses in the dump and in that country you face death for infidelity. If people are killed behind this, these hackers have blood on their hands.

Damn
 
"This is an obvious case of fraud. My email address (this website doesn't verify emails, and all the relevant emails went to junk) can be found online and so can my address, as it is linked to my business account, which is registered online."

Tzortzis also said he has filed a formal complaint with the police over the hack of his bank details. He added: "I am not ruling anything out at the moment, including the possibility of my phone being illegally hacked. Retrospectively speaking, it has shown signs of being hacked.

"It seems that the first transaction was made in Australia  when I was there for lectures and courses. It could have been someone who knows me, someone who hates me, or a malicious person who found out who I was. It could be one person or two, they could be working locally, from abroad or both," he wrote."

laugh.gif
 
[QUOTE url="[URL]http://thehill.com/author/cory-bennett[/URL]"]

15,000 government emails revealed in Ashley Madison leak bCory Bennett - 08/19/15 09:55 AM EDT



Thousands of clients using the affair-oriented Ashley Madison website listed email addresses registered to the White House, top federal agencies and military branches, a data dump by hackers revealed.



The detailed data, released Tuesday, will likely put Washington, D.C., on edge. The nation’s capital reportedly has the highest rate of membership for the site of any city.



Indeed, more than 15,000 of the email addresses used to register accounts were hosted on government and military servers.



Buried in the list are emails that could be tied to multiple administration agencies, including the State Department and Department of Homeland Security, as well as several tied to both the House and Senate.  



For a month, hackers using the name “Impact Team” have been holding hostage the dating profiles of those who registered on the site. The group threatened to publicly out the potential adulterers if the site’s owner, Avid Life Media, didn’t take down Ashley Madison, which uses the tagline, “Life is short. Have an affair.”



Security researchers said on Wednesday that they believe the data released following the hack at Ashley Madison is authentic.



“This dump appears to be legit,” said David Kennedy, CEO of information security company TrustedSec, which monitors cyber attacks, in a blog post. “Very, very legit.”



Security journalist Brian Krebs reported several of the site’s users told him their real information is in the data dump.



The leaked database is staggering, according to researchers, and larger than expected at 37 million records, or nearly 10 gigabytes compressed.



“For folks that may not know, that is massive,” Kennedy said. “Huge.”



“It's full account information,” said Robert Graham, CEO of Errata Security, in a blog post. That includes full names, emails, phone numbers, addresses and passwords.



“It also includes dating information, like height, weight, and so forth,” Graham added. “It appears to contain addresses, as well as GPS coordinates. I suspect that many people created fake accounts, but with an app that reported their real GPS coordinates.”



Other tech news outlets, such as CSO, have discovered British government officials, United Nations employees and Vatican staff among the millions of people in the leaked database.



However, the site reportedly did not check the validity of email addresses, and it’s likely that many of the government email accounts were faked. For instance, several emails were registered at “whitehouse.gov,” whereas White House officials use “eop.gov” for email communications.



The hackers have indicated their mission is to publicly shame the company, while also teaching its users a lesson.



“Find yourself in here?” they said in a statement posted with the data dump. "It was [Avid Life Media] that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends. Embarrassing now, but you’ll get over it."



http://thehill.com/policy/cybersecu...-real-includes-thousands-of-government-emails

who would use their WORK EMAIL for this ? dummies  :lol:  
[/quote]

Imagine if Obama's senate email was in there :lol:
 
This chick shared the list or those in/around my city...

Saw three or four co-workers and my old landlord :lol:
 
[h1]The irony: Ashley Madison plotted hacking rivals to stay ahead of the game[/h1]
Leaked emails in the Avid Life data breach suggest the site's CEO was more than happy for employees to steal emails from rival companies.

By Charlie Osborne  for Zero Day  | August 25, 2015 -- 08:49 GMT (01:49 PDT)  | Topic: Security

Ashley Madison may have had a taste of its own medicine this month, judging by a cache of leaked emails which suggest the CEO of the site encouraged the hacking of rival firms.

The discreet encounters website, owned by Avid Life Media (ALM), suffered a high-profile data breach  in July. A hacking group called Impact Team took responsibility for the cyberattack and has subsequently released large caches of stolen user and corporate dataonline.

As reported by Motherboard, the latest file dump includes alleged internal emails relating to the CEO of Avid Life Media, Noel Biderman. The emails suggest that after discovering a serious security vulnerability in rival site Nerve, the founding chief technology officer Raja Bhatia was encouraged to exploit the flaw.

In November 2012, a casual message seen by the publication between the executives relates to a "huge security hole" discovered by Bhatia. Nerve.com, once a dating service, captured the interest of Biderman, who asked for additional details.

After exploring further, the CTO found he had access to a massive amount of user data, saying within an email:
"They did a poor job of auditing their site. Have access to all their user records including emails, encrypted password, if they purchased or not, who they talked to, what their search preferences are, last login, fraud risk profile, who they blocked or are blocked from, photo uploads, etc."
In response, Biderman said, "Holy moly..I would take the emails...," however, Bhatia was not interested in infiltrating the site further and stealing content, reportedly saying he "want[ed] to be able to look my son in the eye one day."

While unwilling to do it himself, the executive did demonstrate to Biderman how to exploit the security hole, in addition to a GitHub post containing the allegedly stolen data of a Nerve user. It is unknown whether Nerve.com was informed of the vulnerability.

Speaking to the publication, an Avid Life Media representative said the comments were taken out of context, and at "no point was there an effort made to hack, steal or use Nerve.com's proprietary data." Instead, while considering strategic partnerships between Nerve and ALM, Biderman asked for Bhatia's help in "conducting technical due diligence on the opportunity." The spokesman said:
"This activity, while clumsily conducted, uncovered certain technology shortcomings which Noel attempted to understand and confirm."
According to security expert Brian Krebs, a selection of documents now released online by Impact Team include a 100-page movie script written by Biderman and personal data belonging to the CEO such as a scanned copy of his driving license, personal checks, bank account numbers and a home address.

ALM has offered a $500,000 reward  for information leading to the arrest of the Impact Team. However, considering the class-action lawsuit  already levied against the company and two suicides  believed to be related to the data breach so far, it remains to be seen whether anything will be left in the company coffers to offer informants.

http://www.zdnet.com/article/the-ir...ted-hacking-rivals-to-stay-ahead-of-the-game/
 
welp, seems like it was a ponzi sausage


AshleyMadison: 31 million men and 12,000 women
Been knew this. A lot of dating websites are just like this. The moment these sites ask for bread you know there's a scam. There's too much money to be made off of Thirsty, lazy guys for it to be legit.

What's crazy is how many men so easily fall for the scam. Because you can easily tell when you're chatting with someone if they're legit, or if they are a bot. 
 
Last edited:
Back
Top Bottom