Dating Website Admits Hackers Have Stolen Data on Millions

1-ashleymadiso.png

The company behind Ashley Madison, a popular online dating service marketed to people trying to cheat on their spouses, said on Monday that the site had been breached by hackers who may have obtained personal data about the service’s millions of members.

The group of hackers behind the attack, going by the name Impact Team, said they had stolen information on the 37 million members of Ashley Madison. To prevent the data from being released, the hackers said, the company needed to shut down the site entirely.

The hackers promised to release the real names, passwords and financial transactions of members if Ashley Madison did not meet that demand. The hackers have leaked some information online already, but that data did not appear to be the bulk of what was collected.

The corporate parent of Ashley Madison, Avid Life Media, said on Monday that it had adjusted its policy for deleting user data, an apparent complaint of the hackers, but the company gave no indication that it planned to close the site.
“We immediately launched a thorough investigation,” the company said, “utilizing leading forensics experts and other security professionals to determine the origin, nature and scope of this incident.”
While nearly every dating website ends up facilitating its fair share of cheaters, Ashley Madison, based in Toronto, has made a name for itself by specifically catering to two-timers.

That business niche has angered not only some consumers, but other companies as well. Football stadiums and soccer teams have turned down sponsorship offers. Both NBC and FOX, after being approached about broadcasting Super Bowl spots, have rebuffed the website.

Nevertheless, since 2001, Ashley Madison has steadily grown to 37 million accounts, according to a figure advertised on the front page of the website. Anyone 18 or older can join the free site discreetly, using a pseudonym. There, the users can list turn-ons and sexual preferences. Only once users start chatting and trading photos do they begin racking up fees — along with, potentially, some marital guilt.

The site has long told users that they can scrub their profiles from the site for $19. But the Hackers say that the user information is never actually deleted — knowledge, security experts said, that suggested the breach may have involved someone inside the company.

Ashley Madison said that when users delete accounts, all information is erased. Still, on Monday, the website waived its deletion fee for all members. The breach, and the hackers complaints about the data policy, was first reported on Sunday by Brian Krebs, a reporter who covers online security.

Noel Biderman, chief executive of Avid Life Media, told Mr. Krebs that the hacker “was definitely a person here that was not an employee but certainly had touched our technical services.” The company would not respond to additional questions about who was behind the breach. The hacking is one in a string aimed at corporations, such as one against Sony in 2014 and another against Target the year before — a trend that security experts say is growing. In May, the sexual preferences of users of AdultFriendFinder, another dating website, were leaked online after a breach.
“I think we’re going to see more of it as people see how effective it is,” said Bruce Schneier, chief technology officer for Resilient Systems, a security company, said of the Ashley Madison breach.

The breach comes at an inopportune time for Avid Life Media, which had expressed interest in pursuing an initial public offering this year. The company owns two other popular sites, Cougar Life and Established Men, that the hackers also breached.

For any dating website, much less one meant for extramarital romance, to continue to grow and be attractive to potential investors, consumers must be confident that their data will be protected. Under American copyright law, Ashley Madison has the power to scrub away private user information leaked in the breach and posted to other websites. On Monday, the company said that it had been doing just that to protect the identities of those who have used Ashley Madison. But that may be a race that it cannot win. Paul Ferguson, senior adviser for Trend Micro, a security software provider, said that information on Ashley Madison, deleted in one online forum, is beginning to bubble up in others.

“Once something is published on the Internet,” he said, “it’s there forever.”
That persistence has some marriage counselors predicting a boom in business — even if names end up unpublished.

“Oh, it’ll be a huge uptick,” said M. Gary Neuman, a marriage counselor in Miami Beach, Fla. and author of “The Truth about Cheating.” “Just the news getting out will have some spouses asking each other, ‘Are you one of the ones using this website?’ ”
NYT:

 

« Delivered: America’s Drone Debut
Hundreds of Thousands' of Vehicles At risk of Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Canadian Centre for Cyber Security (CCCS)

Canadian Centre for Cyber Security (CCCS)

The Cyber Centre is the single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure, the private sector and the public.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Karate Labs

Karate Labs

Karate is an open-source unified test automation platform combining API testing, API performance testing, API mocks & UI testing.

Convergence Networks

Convergence Networks

Convergence Networks is one of North America's leading Managed Services & Security Providers.