HACKERS WHO STOLE sensitive customer information from the cheating site AshleyMadison.com appear to have made good on their threat to post the data online. A data dump, 9.7 gigabytes in size, was posted on Tuesday to the dark web using an Onion address accessible only through the Tor browser. The files appear to include account details and log-ins for some 32 million users of the social networking site, touted as the premier site for married individuals seeking partners for affairs. Seven years worth of credit card and other payment transaction details are also part of the dump, going back to 2007. The data, which amounts to millions of payment transactions, includes names, street address, email address and amount paid, but not credit card numbers; instead it includes four digits for each transaction that may be the last four digits of the credit card or simply a transaction ID unique to each charge. AshleyMadison.com claimed to have nearly 40 million users at the time of the breach about a month ago, all apparently in the market for clandestine hookups.
Ashley Madison is the most famous name in infidelity and married dating, the site asserts on its homepage. Have an Affair today on Ashley Madison. Thousands of cheating wives and cheating husbands signup everyday looking for an affair
. With Our affair guarantee package we guarantee you will find the perfect affair partner.
The data released by the hackers includes names, addresses and phone numbers submitted by users of the site, though its unclear if members provided legitimate details. A sampling of the data indicates that users likely provided random numbers and addresses, but files containing credit card transactions will yield real names and addresses, unless members of the site used anonymous pre-paid cards. One analysis of email addresses found in the data dump also shows that some 15,000 are .mil. or .gov addresses.
The data also includes descriptions of what members were seeking. Im looking for someone who isnt happy at home or just bored and looking for some excitement, wrote one member who provided an address in Ottawa and the name and phone number of someone who works for the Customs and Immigration Union in Canada. I love it when Im called and told I have 15 minutes to get to someplace where Ill be greeted at the door with a surprisemaybe lingerie, nakedness. I like to ravish and be ravished
I like lots of foreplay and stamina, fun, discretion, oral, even willingness to experiment *smile*
Passwords released in the data dump appear to have been hashed using the bcrypt algorithm for PHP, but Robert Graham, CEO of Erratasec, says that despite this being one of the most secure ways to store passwords, hackers are still likely to be able to crack many of these hashes in order to discover the account holders original password. If the accounts are still online, this means hackers will be able to grab any private correspondence associated with the account.
Its notable, however, that the cheating site, in using the secure hashing algorithm, surpassed many other victims of breaches weve seen over the years who never bothered to encrypt customer passwords.
Were so used to seeing cleartext and MD5 hashes, Graham says. Its refreshing to see bcrypt actually being used.
Click for Full Text!
Poster Comment:
Not much to say about this - except that I am more glad than ever that I've been happily married to "Mrs. Rufus" for almost 34 years and have never thought about straying. First saw an ad about this outfit about 15 years ago - thought then it was just another example of a rotted culture.