Hackers Gain Access to 37 Million Records from AshleyMadison.com

By

AshleyMadison.com, the infamous online dating site targeting married adults who are looking to have an affair, found itself this morning the subject of a troubling development, and a threat. Hackers operating under the alias of “The Impact Team” posted some sensitive personal information that was stolen from Avid Life Media, AshleyMadison’s parent company.

The Impact Team also released a statement claiming that they had “taken over all systems in [AshleyMadison’s] entire office” and are threatening to “release all customer records, profiles…nude pictures and conversations” unless AshelyMadison and Established Men, another sexually-driven site owned by Avid Life Media, are taken down. In a statement to KrebsOnSecurity, ALM Chief Executive Noel Biderman confirmed that a data breach had occurred.

Image via Shutterstock

One of the main reasons that The Impact Team cited for deciding to hack ALM is AshleyMadison’s widely touted Full Delete feature. For $19, AshelyMadison claimed, users could erase all trace that they ever used the adult dating website. The Impact Team is claiming this is a falsehood: while a profile can be totally expunged, credit card transaction data, including full name and billing address, remains in existence.

This latest hack is just one among a recent flurry of security breaches around the Web. In May, another online dating site, Adult Friend Finder, was hacked and customer information was leaked. Dating sites are not the only targets either; it was recently revealed that the United States Office of Personal Management yielded access to the personal records of 21.5 million people in a cyberattack.

As hackers grow ever more emboldened and sophisticated, people need to be incredibly wary of what information they share online, and where they share it, TechZone360 senior editor Peter Bernstein says:

“While people believe that their personal affairs, financial as well as their private activities of any kind, should remain private, what the AshleyMadison hack once again proves is that if you provide information online it is subject to being compromised. No security solution is completely failsafe.  In addition, what this also shows is that even if you believe your ‘trusted’ vendor says it adheres your request to delete information you never wish to see publicized, that trust may be misplaced. This is particularly true for transactional information which unlike healthcare, financial service and even retail must meet strict compliance policies and rules. In short, online buyers beware.”

Eric Chiu, president & co-founder of HyTrust also commented on the breach saying, “Data is the new currency and the breach at AshleyMadison shows attackers are not only looking to steal consumer information for profit but also hold companies hostage. Given the extent of the attack, which included user databases, financial records, employee files and other proprietary information as well as the demands of the hackers, the attack most likely happened from the inside. Dating sites have lots of very personal information, including contact information, dates of birth, and sexual preferences. This information can be used to not only steal additional information and ultimately the person's identity, but also embarrass or hold individuals at ransom, especially given that many users would want to keep this information secret from colleagues or spouses. In addition, similar to Snowden and Sony, this is a great example of how organizations can now be held hostage and permanently damaged by the own data that they collect and how important it is to secure sensitive data from insider threats.”


Edited by Dominick Sorrentino
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Enhancing Cybersecurity Measures for Modern Businesses

By: Contributing Writer    7/2/2025

Cyberattacks are rising, and businesses of all sizes feel the pressure. Small companies often think they're too small to be targets. They aren't. Hack…

Read More

Lessons Learned from Enterprise Oracle Cloud Migrations

By: Contributing Writer    7/1/2025

Switching to Oracle Cloud can feel daunting. Security risks, unexpected expenses, and performance troubles often turn what seems like an effortless up…

Read More

Protecting Business Assets with Smarter Security Frameworks

By: Contributing Writer    7/1/2025

Protecting your business is more challenging than ever. Cyber threats are increasing every day. Hackers target small and large businesses alike, searc…

Read More

Emerging Trends in Technology and Their Impact on Future Innovations

By: Contributing Writer    7/1/2025

Technology is changing faster than ever. Business owners often struggle to keep up. What's trending today might be outdated tomorrow. Falling behind c…

Read More

Tech Podcast Award Winners Bring Excitement and Enthusiasm to a Range of Important Tech Topics

By: TMCnet Staff    6/18/2025

Tech Podcast Award winners produce engaging, informative, and often entertaining content, bringing valuable insight from industry front lines to the e…

Read More