Ashley Madison Data Breach
   HOME

TheInfoList



OR:

In July 2015, an unknown person or group calling itself "The Impact Team" announced that they had stolen user data of Ashley Madison, a commercial website billed as enabling extramarital
affair An affair is a relationship typically between two people, one or both of whom are either married or in a long-term Monogamy, monogamous or emotionally-exclusive relationship with someone else. The affair can be solely sexual, solely physical or ...
s. The hackers copied personal information about the site's user base and threatened to release names and personal identifying information if Ashley Madison would not immediately shut down. To underscore the validity of the threat,
personal information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
of more than 2,500 users was released. Ashley Madison denied that its records were insecure and continued to operate. Because of the site's lack of adequate security and practice of not deleting personal information from its database – including real names, home addresses, search history and credit card transaction records – many users feared being publicly shamed. On 18 and 20 August, more than 60 gigabytes of additional data was publicly released, including user details. This included personal information about users who had paid the site to delete their personal information showing that the data was not deleted.


Timeline

The Impact Team announced the attack on 19 July 2015 and threatened to expose the identities of Ashley Madison's users if its parent company, Avid Life Media, did not shut down Ashley Madison and its sister site, "Established Men". On 20 July 2015, the Ashley Madison website put up three statements under its "Media" section addressing the breach. The website's normally busy
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
account fell silent apart from posting the press statements. One statement read: The site also offered to waive its account deletion charge. More than 2,500 customer records were released by "The Impact Team" on 21 July. Initially, Ashley Madison customer service representatives denied that its main database was insecure and had been hacked. However, Noel Biderman, the CEO of Avid Life Media, said: "We’re not denying this happened." He added that the hack was "a criminal act." More than 60 gigabytes of additional data was released on 18 August and was confirmed to be valid. The information was released on
BitTorrent BitTorrent is a Protocol (computing), communication protocol for peer-to-peer file sharing (P2P), which enables users to distribute data and electronic files over the Internet in a Decentralised system, decentralized manner. The protocol is d ...
in the form of a 10 gigabyte compressed archive; the link to it was posted on a
dark web The dark web is the World Wide Web content that exists on darknets ( overlay networks) that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communica ...
site only accessible via the anonymity network
Tor Tor, TOR or ToR may refer to: Places * Toronto, Canada ** Toronto Raptors * Tor, Pallars, a village in Spain * Tor, former name of Sloviansk, Ukraine, a city * Mount Tor, Tasmania, Australia, an extinct volcano * Tor Bay, Devon, England * Tor ...
. The data was cryptographically signed with a PGP key. In its message, the group blamed Avid Life Media, accusing the company of deceptive practices: "We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data ... Too bad for ALM, you promised secrecy but didn't deliver." In response, Avid Life Media released a statement that the company was working with authorities to investigate, and said the hackers were not "
hacktivist Hacktivism (or hactivism; a portmanteau of '' hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. A form of Internet activism with roo ...
s" but criminals. Yet another data dump occurred on 20 August 2015, the largest file of which comprised 12.7 gigabytes of corporate
email Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
s, including Biderman's. In July 2017, Avid Life Media (renamed Ruby Corporation) agreed to settle two dozen lawsuits stemming from the breach for $11.2 million.


Impact and ethics

None of the accounts on the website need email verification to create a profile, meaning that people often create profiles with fake email addresses. Ashley Madison's company required the owner of the email account to pay money to delete the profile, preventing people who had accounts set up without their consent (as a
prank A practical joke or prank is a trick played on people, generally causing the victim to experience embarrassment, perplexity, confusion, or discomfort.Marsh, Moira. 2015. ''Practically Joking''. Logan: Utah State University Press. The perpetrat ...
or mistyped email) from deleting them without paying. Hackers allege that Avid Life Media received $1.7 million a year from people paying to shut down user profiles created on the site. The company falsely asserted that paying them would "fully delete" the profiles, which the hack proved was untrue. Josh Duggar, a 27-year-old man who had become famous as a teenage member of a conservative Christian family featured on a
reality television Reality television is a genre of television programming that documents purportedly unscripted real-life situations, often starring ordinary people rather than professional actors. Reality television emerged as a distinct genre in the early 1990s ...
series named ''
19 Kids and Counting ''19 Kids and Counting'' (formerly ''17 Kids and Counting'' and ''18 Kids and Counting'') is an American reality television series that aired on the cable channel TLC for seven years until its cancellation in 2015. The show features the Duggar ...
'', was one notable user of Ashley Madison whose data was breached. The released data included records of nearly $1,000 of transactions on a credit card account in his name. The news of the data release compounded his problems with revelations earlier that year about police reports of his sexual misconduct; on 20 August, he admitted he had been unfaithful to his wife. The data breach had quickly followed the release of a past police report alleging that he had fondled five underaged girls, including a few of his own sisters. On 25 August, he checked himself into a rehabilitation center. Following the hack, communities of internet vigilantes began combing through to find famous individuals whom they planned to publicly humiliate. France24 reported that 1,200 Saudi Arabian ' .sa' email addresses were in the leaked database, which were further extortionable since adultery is punishable via death in Saudi Arabia. Several thousand U.S. .mil and .gov email addresses were registered on the site. In the days following the breach,
extortionists Extortion is the practice of obtaining benefit (e.g., money or goods) through coercion. In most jurisdictions it is likely to constitute a criminal offence. Robbery is the simplest and most common form of extortion, although making unfounded t ...
began targeting people whose details were included in the leak, attempting to scam over
US$ The United States dollar (Currency symbol, symbol: Dollar sign, $; ISO 4217, currency code: USD) is the official currency of the United States and International use of the U.S. dollar, several other countries. The Coinage Act of 1792 introdu ...
200 worth of
Bitcoins Bitcoin (abbreviation: BTC; sign: ₿) is the first decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under the pseudonym of Satoshi Nakamoto. Use o ...
from them. One company started offering a "search engine" where people could type email addresses of colleagues or their spouse into the website, and if the email address was on the database leak, then the company would send them letters threatening that their details were to be exposed unless they paid money to the company. A variety of security researchers and
internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
activists debated the
media ethics Media ethics is the subdivision of applied ethics dealing with the specific ethical principles and standards of media, including broadcast media, film, theatre, the arts, print media and the internet. The field covers many varied and highly contro ...
of journalists reporting on the specifics of the data, such as the names of users revealed to be members. A number of commentators compared the hack to the loss of privacy during the 2014 celebrity photo hack. Clinical psychologists argued that dealing with an affair in a particularly public way increases the hurt for spouses and children. Carolyn Gregoire argued that "Social media has created an aggressive culture of public shaming in which individuals take it upon themselves to inflict psychological damage" and that more often than not, "the punishment goes beyond the scope of the crime." Graham Cluley argued that the psychological consequences for people shamed could be immense and that it would be possible for some to be bullied into suicide. Charles J. Orlando, who had joined the site to conduct research on women who cheat, wrote of his concern for the spouses and children of
outed Outing is the act of disclosing an LGBTQ person's sexual orientation or gender identity without their consent. It is often done for political reasons, either to instrumentalize homophobia, biphobia, and/or transphobia in order to discredit politi ...
cheaters, saying that "the mob that is the Internet is more than willing to serve as judge, jury, and executioner" and that site members did not deserve "a flogging in the virtual town square with millions of onlookers". On 24 August 2015,
Toronto Toronto ( , locally pronounced or ) is the List of the largest municipalities in Canada by population, most populous city in Canada. It is the capital city of the Provinces and territories of Canada, Canadian province of Ontario. With a p ...
police announced that two unconfirmed suicides had been linked to the data breach, in addition to "reports of hate crimes connected to the hack". Unconfirmed reports say a man in the U.S. died by suicide. At least one suicide, which was previously linked to Ashley Madison, has since been reported as being due to "stress entirely related to issues at work that had no connection to the data leak". The same day, a pastor and professor at the
New Orleans Baptist Theological Seminary New Orleans Baptist Theological Seminary (NOBTS) is a Baptist theological institute in New Orleans, Louisiana. It is affiliated with the Southern Baptist Convention. Missions and evangelism are core focuses of the seminary. NOBTS offers doctora ...
killed himself citing the leak that had occurred six days before. Users whose details were leaked filed a $567 million class-action lawsuit against Avid Dating Life and Avid Media, the owners of Ashley Madison, through Canadian law firms Charney Lawyers and Sutts, Strosberg LLP. In July 2017, the owner of Ruby Corp. announced the company would settle the lawsuit for $11.2 million. In a 2019 interview, Ashley Madison's chief strategy officer Paul Keable confirmed the installment of security features like two-factor verification, PCI compliance and fully-encrypted browsing as a consequence of the hacker attack from 2015.


Data analysis

Annalee Newitz Annalee Newitz (born May 7, 1969) is an American journalist, editor, and author of both fiction and nonfiction. From 1999 to 2008, Newitz wrote a syndicated weekly column called ''Techsploitation'', and from 2000 to 2004 was the culture editor o ...
, editor-in-chief of ''
Gizmodo ''Gizmodo'' () is a design, technology, science, and science fiction website. It was originally launched as part of the Gawker Media network run by Nick Denton. ''Gizmodo'' also includes the sub-blogs ''io9'' and ''Earther'', which focus on pop ...
'', analyzed the leaked data. They initially found that only roughly 12,000 (0.22%) of the 5.5 million registered female accounts were used regularly. The vast majority of accounts had been used only the day they were registered. Newitz also found that many women's accounts were created from the same IP address, suggesting there were many fake accounts. They found that women checked email messages very infrequently: every one time a woman checked her email, 13,585 men checked theirs. Only 9,700 of the 5.5 million female accounts had ever replied to a message, compared to the 5.9 million men who would do the same. They concluded, "The women's accounts show so little activity that they might as well not be there." In a subsequent article the following week Newitz acknowledged that they had "misunderstood the evidence" in their previous article and that their conclusion that there were few females active on the site had been based on data recording "bot" activities in contacting members. Newitz confirmed that Ashley Madison had created more than 70,000 female bots to send millions of fake messages to male users. Still, they note that "we have absolutely no data recording human activity at all in the Ashley Madison database dump from Impact Team. All we can see is when fake humans contacted real ones." They noted that the site seemed to keep track of human-to-human contact but that the Impact Team had not released this data. Passwords on the live site were hashed using the
bcrypt bcrypt is a password-hashing function designed by Niels Provos and David Mazières. It is based on the Blowfish (cipher), Blowfish cipher and presented at USENIX in 1999. Besides incorporating a salt (cryptography), salt to protect against rain ...
algorithm. A security analyst using the
Hashcat Hashcat is a password cracking, password recovery tool. It had a proprietary code base until 2015, but was then released as open source software. Versions are available for Linux, macOS, and Windows. Examples of hashcat-supported hashing algorithm ...
password recovery tool with a
dictionary A dictionary is a listing of lexemes from the lexicon of one or more specific languages, often arranged Alphabetical order, alphabetically (or by Semitic root, consonantal root for Semitic languages or radical-and-stroke sorting, radical an ...
based on the RockYou passwords found that among the 4,000 passwords that were the easiest to crack, "123456" and "password" were the most commonly used passwords on the live website. An analysis of old passwords on an archived version showed that "123456" and "password" were the most commonly used. Due to a design error where passwords were also hashed separately with the insecure algorithm
MD5 The MD5 message-digest algorithm is a widely used hash function producing a 128-bit hash value. MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as Request for Comments, RFC 1321. MD5 ...
, 11 million passwords were eventually cracked. While acknowledging that some men had detected the ruse, staff writer Claire Brownell of the ''
Financial Post The ''Financial Post'' is a financial news website, and business section of the ''National Post'', both publications of the Postmedia Network. It started as an English Canadian business newspaper, which published from 1907 to 1998. In 1998, the ...
'' suggested that if only a few interactions were conducted, the
Turing test The Turing test, originally called the imitation game by Alan Turing in 1949,. Turing wrote about the ‘imitation game’ centrally and extensively throughout his 1950 text, but apparently retired the term thereafter. He referred to ‘ iste ...
could be passed by the women-imitating
chatbot A chatbot (originally chatterbot) is a software application or web interface designed to have textual or spoken conversations. Modern chatbots are typically online and use generative artificial intelligence systems that are capable of main ...
s that had fooled many men into buying special accounts.


Popular culture

The data breach is the subject of the 2023
Hulu Hulu (, ) is an American Subscription business model, subscription streaming media service owned by Disney Streaming, a subsidiary of the Disney Entertainment segment of the Walt Disney Company. It was launched on October 29, 2007, initially as ...
series ''The Ashley Madison Affair'' and the 2024
Netflix Netflix is an American subscription video on-demand over-the-top streaming service. The service primarily distributes original and acquired films and television shows from various genres, and it is available internationally in multiple lang ...
series ''Ashley Madison: Sex, Lies & Scandal''.


See also

*
Internet vigilantism Internet vigilantism is the act of carrying out vigilante activities through the Internet. The term encompasses vigilantism against alleged scams, crimes, and non-Internet-related behavior. The expanding scope of media savvy and online interacti ...
*
Online shaming Online shaming is a form of public shaming in which targets are publicly humiliated on the internet, via social media platforms (e.g. Twitter or Facebook), or more localized media (e.g. email groups). As online shaming frequently involves expo ...


References

{{Hacking in the 2010s 2015 in Canada Cyberattacks Data breaches Hacking in the 2010s July 2015 Email hacking fr:Ashley Madison#Piratage et fuite de données