SlideShare a Scribd company logo
1 of 16
THE ASHLEY MADISON HACK
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!
concise
cybersecurity
Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers,
known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from
Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a
number of other dating/ hookup services.
The data dump includes customers’ credit cards and ALM internal documents.
The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley
Madison unless the website is permanently closed.
concise
cybersecurity
Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers,
known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from
Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a
number of other dating/ hookup services.
The data dump includes customers’ credit cards and ALM internal documents.
The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley
Madison unless the website is permanently closed.
concise
cybersecurity
The Impact Team releases a data dump
containing the account details of all 37
million users of Ashley Madison.
Altogether, the files contain 9.7 GB of
data which are accessible via the ‘deep
web’ and include names, passwords,
addresses, phone numbers and credit
card transactions of the site’s users.
concise
cybersecurity
TIMELINE
AUGUST 18, 2015
The Ashley Madison data dump is posted on the open web, making its’
information readily searchable on several public websites. However, there
is only one full download since one of the original seeders (in the torrent
pool) with the only full copy, unplugged before leechers could obtain the
full download. However, thousands of people downloaded 97% of that
particular data-set.
concise
cybersecurity
TIMELINE
AUGUST 19, 2015
The hackers release a second data dump of sensitive materials. This time
the data includes 13 GB of information stolen from Biderman’s (the CEO)
private email account. Researchers attempt to open that file, labeled
‘noel.biderman.mail.7z,’ but find that it cannot be unpacked because it has
been corrupted.
concise
cybersecurity
TIMELINE
AUGUST 20, 2015
Two Canadian law firms ‘Charney Lawyers and
Sutts, Strosberg’, both of Ontario file a 578
million class-action lawsuit against Avid Dating
Life and Avid Life Media on behalf of Canadian
citizens who in the past subscribed to Ashley
Madison’s services. According to a statement
issued by the firms, their lawsuit considers to
what extent the website protected its users’
privacy under Canadian law.
concise
cybersecurity
TIMELINE
AUGUST 21, 2015
Two Canadian law firms ‘Charney Lawyers and
Sutts, Strosberg’, both of Ontario file a 578
million class-action lawsuit against Avid Dating
Life and Avid Life Media on behalf of Canadian
citizens who in the past subscribed to Ashley
Madison’s services. According to a statement
issued by the firms, their lawsuit considers to
what extent the website protected its users’
privacy under Canadian law.
concise
cybersecurity
TIMELINE
AUGUST 21, 2015
At issue is a feature of Ashley
Madison called ‘paid-delete,’ a
process whereby users could
have their data erased from the
website’s servers for a fee of
USD 19.
The ‘Impact Team’ releases a third dump, which includes a zip file
containing messages leaked from Biderman’s personal email account.
The emails reveal that Biderman cheated on his wife and attempted to
engage in adultery with at least three other separate women.
concise
cybersecurity
TIMELINE
AUGUST 22, 2015
Toronto Police in Canada begin investigating two suicide reports with
possible ties to the Ashley Madison hacking scandal. Meanwhile, the
adultery website announces a USD 380,000 reward for any information that
could lead to the arrest of those responsible for hacking its servers.
concise
cybersecurity
TIMELINE
AUGUST 24, 2015
It is announced that scammers and
extortionists had begun to target Ashley
Madison’s users.
concise
cybersecurity
TIMELINE
AUGUST 25, 2015
concise
cybersecurity
THE ACTUAL DEFACED WEBSITE
concise
cybersecurity
WHO WAS/ WERE THE
HACKERS?
THIS IS PART 1 OF 3 OF A FREE VIDEO
COURSE OFFERED BY CONCISE COURSES
WWW.CONCISE-COURSES.COM/TRAINING/

More Related Content

What's hot

Musas da velha guarda
Musas da velha guardaMusas da velha guarda
Musas da velha guarda
JotaCicero
 
Premiere condom 10 step mktg plan
Premiere condom 10 step mktg planPremiere condom 10 step mktg plan
Premiere condom 10 step mktg plan
Mitsu Enatsu
 
Old Spice Case Analysis
Old Spice Case AnalysisOld Spice Case Analysis
Old Spice Case Analysis
hinchk08
 

What's hot (20)

Musas da velha guarda
Musas da velha guardaMusas da velha guarda
Musas da velha guarda
 
Health & Well-being: Science, Medical Education And Public Health
Health & Well-being: Science, Medical Education And Public HealthHealth & Well-being: Science, Medical Education And Public Health
Health & Well-being: Science, Medical Education And Public Health
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
Publishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the CloudPublishing Production: From the Desktop to the Cloud
Publishing Production: From the Desktop to the Cloud
 
Femalejaculation
FemalejaculationFemalejaculation
Femalejaculation
 
Lululemon Copy Campaign
Lululemon Copy CampaignLululemon Copy Campaign
Lululemon Copy Campaign
 
Testing at Spotify
Testing at SpotifyTesting at Spotify
Testing at Spotify
 
Premiere condom 10 step mktg plan
Premiere condom 10 step mktg planPremiere condom 10 step mktg plan
Premiere condom 10 step mktg plan
 
Keith J. Jones, Ph.D. - MALGAZER: AN AUTOMATED MALWARE CLASSIFIER WITH RUNNIN...
Keith J. Jones, Ph.D. - MALGAZER: AN AUTOMATED MALWARE CLASSIFIER WITH RUNNIN...Keith J. Jones, Ph.D. - MALGAZER: AN AUTOMATED MALWARE CLASSIFIER WITH RUNNIN...
Keith J. Jones, Ph.D. - MALGAZER: AN AUTOMATED MALWARE CLASSIFIER WITH RUNNIN...
 
OgilvyRED - Dollars and Sense of Connectivity
OgilvyRED - Dollars and Sense of ConnectivityOgilvyRED - Dollars and Sense of Connectivity
OgilvyRED - Dollars and Sense of Connectivity
 
Jack D. Ryger: Best Colorado Ski Resorts
Jack D. Ryger: Best Colorado Ski ResortsJack D. Ryger: Best Colorado Ski Resorts
Jack D. Ryger: Best Colorado Ski Resorts
 
Lululemon Deck
Lululemon DeckLululemon Deck
Lululemon Deck
 
LOVELY GIRLS. pps
LOVELY GIRLS. ppsLOVELY GIRLS. pps
LOVELY GIRLS. pps
 
Chatbots 101
Chatbots 101Chatbots 101
Chatbots 101
 
Schmidt Ocean Institute 2018 Annual Report
Schmidt Ocean Institute 2018 Annual ReportSchmidt Ocean Institute 2018 Annual Report
Schmidt Ocean Institute 2018 Annual Report
 
Living on the edge AI Artificial Intelligence - ROBOTICS - edge computing
Living on the edge  AI Artificial Intelligence - ROBOTICS - edge computingLiving on the edge  AI Artificial Intelligence - ROBOTICS - edge computing
Living on the edge AI Artificial Intelligence - ROBOTICS - edge computing
 
Evan Cid: 10 Pasos Para Seducir A Una Mujer
Evan Cid: 10 Pasos Para Seducir A Una MujerEvan Cid: 10 Pasos Para Seducir A Una Mujer
Evan Cid: 10 Pasos Para Seducir A Una Mujer
 
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data DivesGrowth Hacking with Data: How to Find Big Growth with Deep Data Dives
Growth Hacking with Data: How to Find Big Growth with Deep Data Dives
 
Sex Position Roulette - What Are Your Odds
Sex Position Roulette - What Are Your OddsSex Position Roulette - What Are Your Odds
Sex Position Roulette - What Are Your Odds
 
Old Spice Case Analysis
Old Spice Case AnalysisOld Spice Case Analysis
Old Spice Case Analysis
 

Similar to Ashely Madison Hack

Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
post_it
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
acarolyn
 

Similar to Ashely Madison Hack (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
 
Celebrities' emails stolen in cyber attack on law firm to the stars
Celebrities' emails stolen in cyber attack on law firm to the starsCelebrities' emails stolen in cyber attack on law firm to the stars
Celebrities' emails stolen in cyber attack on law firm to the stars
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Cybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrainCybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrain
 
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight..."2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
 
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Bus 356 show and tell
Bus 356 show and tellBus 356 show and tell
Bus 356 show and tell
 

More from London School of Cyber Security

More from London School of Cyber Security (20)

The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic DistributionSilk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Gauntlt Rugged By Example
Gauntlt Rugged By ExampleGauntlt Rugged By Example
Gauntlt Rugged By Example
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
Sploitego
SploitegoSploitego
Sploitego
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Blind XSS
Blind XSSBlind XSS
Blind XSS
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
 
Sploitego
SploitegoSploitego
Sploitego
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Ashely Madison Hack

  • 2. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!
  • 4. Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers, known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a number of other dating/ hookup services. The data dump includes customers’ credit cards and ALM internal documents. The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley Madison unless the website is permanently closed. concise cybersecurity
  • 5. Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers, known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a number of other dating/ hookup services. The data dump includes customers’ credit cards and ALM internal documents. The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley Madison unless the website is permanently closed. concise cybersecurity
  • 6. The Impact Team releases a data dump containing the account details of all 37 million users of Ashley Madison. Altogether, the files contain 9.7 GB of data which are accessible via the ‘deep web’ and include names, passwords, addresses, phone numbers and credit card transactions of the site’s users. concise cybersecurity TIMELINE AUGUST 18, 2015
  • 7. The Ashley Madison data dump is posted on the open web, making its’ information readily searchable on several public websites. However, there is only one full download since one of the original seeders (in the torrent pool) with the only full copy, unplugged before leechers could obtain the full download. However, thousands of people downloaded 97% of that particular data-set. concise cybersecurity TIMELINE AUGUST 19, 2015
  • 8. The hackers release a second data dump of sensitive materials. This time the data includes 13 GB of information stolen from Biderman’s (the CEO) private email account. Researchers attempt to open that file, labeled ‘noel.biderman.mail.7z,’ but find that it cannot be unpacked because it has been corrupted. concise cybersecurity TIMELINE AUGUST 20, 2015
  • 9. Two Canadian law firms ‘Charney Lawyers and Sutts, Strosberg’, both of Ontario file a 578 million class-action lawsuit against Avid Dating Life and Avid Life Media on behalf of Canadian citizens who in the past subscribed to Ashley Madison’s services. According to a statement issued by the firms, their lawsuit considers to what extent the website protected its users’ privacy under Canadian law. concise cybersecurity TIMELINE AUGUST 21, 2015
  • 10. Two Canadian law firms ‘Charney Lawyers and Sutts, Strosberg’, both of Ontario file a 578 million class-action lawsuit against Avid Dating Life and Avid Life Media on behalf of Canadian citizens who in the past subscribed to Ashley Madison’s services. According to a statement issued by the firms, their lawsuit considers to what extent the website protected its users’ privacy under Canadian law. concise cybersecurity TIMELINE AUGUST 21, 2015 At issue is a feature of Ashley Madison called ‘paid-delete,’ a process whereby users could have their data erased from the website’s servers for a fee of USD 19.
  • 11. The ‘Impact Team’ releases a third dump, which includes a zip file containing messages leaked from Biderman’s personal email account. The emails reveal that Biderman cheated on his wife and attempted to engage in adultery with at least three other separate women. concise cybersecurity TIMELINE AUGUST 22, 2015
  • 12. Toronto Police in Canada begin investigating two suicide reports with possible ties to the Ashley Madison hacking scandal. Meanwhile, the adultery website announces a USD 380,000 reward for any information that could lead to the arrest of those responsible for hacking its servers. concise cybersecurity TIMELINE AUGUST 24, 2015
  • 13. It is announced that scammers and extortionists had begun to target Ashley Madison’s users. concise cybersecurity TIMELINE AUGUST 25, 2015
  • 16. THIS IS PART 1 OF 3 OF A FREE VIDEO COURSE OFFERED BY CONCISE COURSES WWW.CONCISE-COURSES.COM/TRAINING/