SlideShare a Scribd company logo
1 of 16
THE ASHLEY MADISON HACK
FOR THE FULL FREE VIDEO
COURSE PLEASE VISIT
WWW.CONCISE-COURSES.COM/TRAINING/
Valid for Continuing Education!
concise
cybersecurity
Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers,
known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from
Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a
number of other dating/ hookup services.
The data dump includes customers’ credit cards and ALM internal documents.
The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley
Madison unless the website is permanently closed.
concise
cybersecurity
Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers,
known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from
Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a
number of other dating/ hookup services.
The data dump includes customers’ credit cards and ALM internal documents.
The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley
Madison unless the website is permanently closed.
concise
cybersecurity
The Impact Team releases a data dump
containing the account details of all 37
million users of Ashley Madison.
Altogether, the files contain 9.7 GB of
data which are accessible via the ‘deep
web’ and include names, passwords,
addresses, phone numbers and credit
card transactions of the site’s users.
concise
cybersecurity
TIMELINE
AUGUST 18, 2015
The Ashley Madison data dump is posted on the open web, making its’
information readily searchable on several public websites. However, there
is only one full download since one of the original seeders (in the torrent
pool) with the only full copy, unplugged before leechers could obtain the
full download. However, thousands of people downloaded 97% of that
particular data-set.
concise
cybersecurity
TIMELINE
AUGUST 19, 2015
The hackers release a second data dump of sensitive materials. This time
the data includes 13 GB of information stolen from Biderman’s (the CEO)
private email account. Researchers attempt to open that file, labeled
‘noel.biderman.mail.7z,’ but find that it cannot be unpacked because it has
been corrupted.
concise
cybersecurity
TIMELINE
AUGUST 20, 2015
Two Canadian law firms ‘Charney Lawyers and
Sutts, Strosberg’, both of Ontario file a 578
million class-action lawsuit against Avid Dating
Life and Avid Life Media on behalf of Canadian
citizens who in the past subscribed to Ashley
Madison’s services. According to a statement
issued by the firms, their lawsuit considers to
what extent the website protected its users’
privacy under Canadian law.
concise
cybersecurity
TIMELINE
AUGUST 21, 2015
Two Canadian law firms ‘Charney Lawyers and
Sutts, Strosberg’, both of Ontario file a 578
million class-action lawsuit against Avid Dating
Life and Avid Life Media on behalf of Canadian
citizens who in the past subscribed to Ashley
Madison’s services. According to a statement
issued by the firms, their lawsuit considers to
what extent the website protected its users’
privacy under Canadian law.
concise
cybersecurity
TIMELINE
AUGUST 21, 2015
At issue is a feature of Ashley
Madison called ‘paid-delete,’ a
process whereby users could
have their data erased from the
website’s servers for a fee of
USD 19.
The ‘Impact Team’ releases a third dump, which includes a zip file
containing messages leaked from Biderman’s personal email account.
The emails reveal that Biderman cheated on his wife and attempted to
engage in adultery with at least three other separate women.
concise
cybersecurity
TIMELINE
AUGUST 22, 2015
Toronto Police in Canada begin investigating two suicide reports with
possible ties to the Ashley Madison hacking scandal. Meanwhile, the
adultery website announces a USD 380,000 reward for any information that
could lead to the arrest of those responsible for hacking its servers.
concise
cybersecurity
TIMELINE
AUGUST 24, 2015
It is announced that scammers and
extortionists had begun to target Ashley
Madison’s users.
concise
cybersecurity
TIMELINE
AUGUST 25, 2015
concise
cybersecurity
THE ACTUAL DEFACED WEBSITE
concise
cybersecurity
WHO WAS/ WERE THE
HACKERS?
THIS IS PART 1 OF 3 OF A FREE VIDEO
COURSE OFFERED BY CONCISE COURSES
WWW.CONCISE-COURSES.COM/TRAINING/

More Related Content

What's hot

Film fact file for 3 films
Film fact file for 3 films Film fact file for 3 films
Film fact file for 3 films Shanice1
 
9 motivos-para-viajar-a-brasil
9 motivos-para-viajar-a-brasil9 motivos-para-viajar-a-brasil
9 motivos-para-viajar-a-brasilEroticosOnline
 
R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)Domenico Barra
 
Bigger, fuller breasts
Bigger, fuller breastsBigger, fuller breasts
Bigger, fuller breastsloveoki
 
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...Gaurav Kamboj
 
Unsolved Robbery Cases in India
Unsolved Robbery Cases in IndiaUnsolved Robbery Cases in India
Unsolved Robbery Cases in Indiapriya mehta
 
Harassment & Discrimination in the Workplace
Harassment & Discrimination in the WorkplaceHarassment & Discrimination in the Workplace
Harassment & Discrimination in the WorkplacePam Howland
 
Download free international email list, international email lists, internatio...
Download free international email list, international email lists, internatio...Download free international email list, international email lists, internatio...
Download free international email list, international email lists, internatio...UsaEmailIdListsDatabase
 
The small penis bible by ant smith
The small penis bible by ant smithThe small penis bible by ant smith
The small penis bible by ant smithStephanPienaar4
 
Male chastity deflating the three most ridiculous myths
Male chastity   deflating the three most ridiculous mythsMale chastity   deflating the three most ridiculous myths
Male chastity deflating the three most ridiculous mythsMilan Padariya
 
Hate crimes in india 2021
Hate crimes in india 2021Hate crimes in india 2021
Hate crimes in india 2021LavikaGoyal3
 
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign TrackingSu Steve
 
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...Parveen Kumar Sharma
 
Create a Homemade Penis Extender in 10 Simple Steps
Create a Homemade Penis Extender in 10 Simple StepsCreate a Homemade Penis Extender in 10 Simple Steps
Create a Homemade Penis Extender in 10 Simple Stepsleadingedgehealth
 
Playboy Strategy
Playboy StrategyPlayboy Strategy
Playboy StrategyKeith Loo
 

What's hot (20)

Film fact file for 3 films
Film fact file for 3 films Film fact file for 3 films
Film fact file for 3 films
 
9 motivos-para-viajar-a-brasil
9 motivos-para-viajar-a-brasil9 motivos-para-viajar-a-brasil
9 motivos-para-viajar-a-brasil
 
R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)R3D L!Nk D!$TR!Ct (NSFW)
R3D L!Nk D!$TR!Ct (NSFW)
 
Bigger, fuller breasts
Bigger, fuller breastsBigger, fuller breasts
Bigger, fuller breasts
 
Phishing
PhishingPhishing
Phishing
 
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
 
Unsolved Robbery Cases in India
Unsolved Robbery Cases in IndiaUnsolved Robbery Cases in India
Unsolved Robbery Cases in India
 
Harassment & Discrimination in the Workplace
Harassment & Discrimination in the WorkplaceHarassment & Discrimination in the Workplace
Harassment & Discrimination in the Workplace
 
Download free international email list, international email lists, internatio...
Download free international email list, international email lists, internatio...Download free international email list, international email lists, internatio...
Download free international email list, international email lists, internatio...
 
The small penis bible by ant smith
The small penis bible by ant smithThe small penis bible by ant smith
The small penis bible by ant smith
 
Rebecca's Transformation
Rebecca's TransformationRebecca's Transformation
Rebecca's Transformation
 
Male chastity deflating the three most ridiculous myths
Male chastity   deflating the three most ridiculous mythsMale chastity   deflating the three most ridiculous myths
Male chastity deflating the three most ridiculous myths
 
Pornografía»
Pornografía»Pornografía»
Pornografía»
 
Elegant Lust
Elegant LustElegant Lust
Elegant Lust
 
Hate crimes in india 2021
Hate crimes in india 2021Hate crimes in india 2021
Hate crimes in india 2021
 
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
[Hitcon 2020 CTI Village] Threat Hunting to Campaign Tracking
 
Online pornography
Online pornographyOnline pornography
Online pornography
 
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
साइबर जगत में सुरक्षा: विद्यालयों के लिए (CIET-NCERT) | Cyber Safety and Secu...
 
Create a Homemade Penis Extender in 10 Simple Steps
Create a Homemade Penis Extender in 10 Simple StepsCreate a Homemade Penis Extender in 10 Simple Steps
Create a Homemade Penis Extender in 10 Simple Steps
 
Playboy Strategy
Playboy StrategyPlayboy Strategy
Playboy Strategy
 

Similar to Ashely Madison Hack

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QAFest
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013Shoplet_
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013post_it
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015Identacor
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryProtected Harbor
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Cybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrainCybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTraininfosecTrain
 
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight..."2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...InfosecTrain Education
 
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑Infosec train
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxacarolyn
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOhad Flinker
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsCBIZ, Inc.
 

Similar to Ashely Madison Hack (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
 
Celebrities' emails stolen in cyber attack on law firm to the stars
Celebrities' emails stolen in cyber attack on law firm to the starsCelebrities' emails stolen in cyber attack on law firm to the stars
Celebrities' emails stolen in cyber attack on law firm to the stars
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
Top data breaches in 2013
Top data breaches in 2013Top data breaches in 2013
Top data breaches in 2013
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015
 
Top Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout HistoryTop Law Firm Cyber Attacks Throughout History
Top Law Firm Cyber Attacks Throughout History
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Cybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrainCybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrain
 
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight..."2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
"2023 Cybersecurity Chronicles: Trends, Threats, Triumphs, and Expert Insight...
 
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐂𝐡𝐫𝐨𝐧𝐢𝐜𝐥𝐞𝐬 𝐨𝐟 𝟐𝟎𝟐𝟑
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security IntelligenceOpen Web Data Feeds for Cybersecurity & Homeland Security Intelligence
Open Web Data Feeds for Cybersecurity & Homeland Security Intelligence
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Takeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security IncidentsTakeaways from 2019's Biggest Information Security Incidents
Takeaways from 2019's Biggest Information Security Incidents
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Bus 356 show and tell
Bus 356 show and tellBus 356 show and tell
Bus 356 show and tell
 

More from London School of Cyber Security

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?London School of Cyber Security
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsLondon School of Cyber Security
 

More from London School of Cyber Security (20)

The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Silk Road & Online Narcotic Distribution
Silk Road & Online Narcotic DistributionSilk Road & Online Narcotic Distribution
Silk Road & Online Narcotic Distribution
 
How To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot AttacksHow To Protect Your Website From Bot Attacks
How To Protect Your Website From Bot Attacks
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
How To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and TrainingHow To Catch a Phish: User Awareness and Training
How To Catch a Phish: User Awareness and Training
 
Advanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA EnvironmentsAdvanced Threat Detection in ICS – SCADA Environments
Advanced Threat Detection in ICS – SCADA Environments
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 
Building an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence ProgramBuilding an Effective Cyber Intelligence Program
Building an Effective Cyber Intelligence Program
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Gauntlt Rugged By Example
Gauntlt Rugged By ExampleGauntlt Rugged By Example
Gauntlt Rugged By Example
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?Website Impersonation Attacks. Who is REALLY Behind That Mask?
Website Impersonation Attacks. Who is REALLY Behind That Mask?
 
Sploitego
SploitegoSploitego
Sploitego
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Blind XSS
Blind XSSBlind XSS
Blind XSS
 
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker HotshotsChanging the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
Changing the Mindset: Creating a Risk-Conscious Culture - Hacker Hotshots
 
Sploitego
SploitegoSploitego
Sploitego
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 

Recently uploaded

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 

Recently uploaded (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Ashely Madison Hack

  • 2. FOR THE FULL FREE VIDEO COURSE PLEASE VISIT WWW.CONCISE-COURSES.COM/TRAINING/ Valid for Continuing Education!
  • 4. Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers, known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a number of other dating/ hookup services. The data dump includes customers’ credit cards and ALM internal documents. The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley Madison unless the website is permanently closed. concise cybersecurity
  • 5. Brian Krebs, a well-known cyber blogger, breaks a story revealing that a group of hackers, known as ‘The Impact Team’, published approx 40 MB of sensitive internal data stolen from Avid Life Media, (referred to now as ‘ALM’), the organization that owns Ashley Madison and a number of other dating/ hookup services. The data dump includes customers’ credit cards and ALM internal documents. The ‘Impact Team’ threatens to release sensitive details of all 37 million users of Ashley Madison unless the website is permanently closed. concise cybersecurity
  • 6. The Impact Team releases a data dump containing the account details of all 37 million users of Ashley Madison. Altogether, the files contain 9.7 GB of data which are accessible via the ‘deep web’ and include names, passwords, addresses, phone numbers and credit card transactions of the site’s users. concise cybersecurity TIMELINE AUGUST 18, 2015
  • 7. The Ashley Madison data dump is posted on the open web, making its’ information readily searchable on several public websites. However, there is only one full download since one of the original seeders (in the torrent pool) with the only full copy, unplugged before leechers could obtain the full download. However, thousands of people downloaded 97% of that particular data-set. concise cybersecurity TIMELINE AUGUST 19, 2015
  • 8. The hackers release a second data dump of sensitive materials. This time the data includes 13 GB of information stolen from Biderman’s (the CEO) private email account. Researchers attempt to open that file, labeled ‘noel.biderman.mail.7z,’ but find that it cannot be unpacked because it has been corrupted. concise cybersecurity TIMELINE AUGUST 20, 2015
  • 9. Two Canadian law firms ‘Charney Lawyers and Sutts, Strosberg’, both of Ontario file a 578 million class-action lawsuit against Avid Dating Life and Avid Life Media on behalf of Canadian citizens who in the past subscribed to Ashley Madison’s services. According to a statement issued by the firms, their lawsuit considers to what extent the website protected its users’ privacy under Canadian law. concise cybersecurity TIMELINE AUGUST 21, 2015
  • 10. Two Canadian law firms ‘Charney Lawyers and Sutts, Strosberg’, both of Ontario file a 578 million class-action lawsuit against Avid Dating Life and Avid Life Media on behalf of Canadian citizens who in the past subscribed to Ashley Madison’s services. According to a statement issued by the firms, their lawsuit considers to what extent the website protected its users’ privacy under Canadian law. concise cybersecurity TIMELINE AUGUST 21, 2015 At issue is a feature of Ashley Madison called ‘paid-delete,’ a process whereby users could have their data erased from the website’s servers for a fee of USD 19.
  • 11. The ‘Impact Team’ releases a third dump, which includes a zip file containing messages leaked from Biderman’s personal email account. The emails reveal that Biderman cheated on his wife and attempted to engage in adultery with at least three other separate women. concise cybersecurity TIMELINE AUGUST 22, 2015
  • 12. Toronto Police in Canada begin investigating two suicide reports with possible ties to the Ashley Madison hacking scandal. Meanwhile, the adultery website announces a USD 380,000 reward for any information that could lead to the arrest of those responsible for hacking its servers. concise cybersecurity TIMELINE AUGUST 24, 2015
  • 13. It is announced that scammers and extortionists had begun to target Ashley Madison’s users. concise cybersecurity TIMELINE AUGUST 25, 2015
  • 16. THIS IS PART 1 OF 3 OF A FREE VIDEO COURSE OFFERED BY CONCISE COURSES WWW.CONCISE-COURSES.COM/TRAINING/