Cheating Website Ashley Madison Hacked

Cheating Website Ashley Madison Hacked

Author
Discussion

Negative Creep

24,988 posts

228 months

Wednesday 19th August 2015
quotequote all
lambosagogo said:
Soov535 said:
It's clearly a very carefully and well executed smear campaign. The smearers (?) took her contact details, entered them into a website for middle aged sleazy types, hacked the security of said site, sat on the data for a month and then released her name in amongst many million others just so they could target her. They really pulled out all the stops - risking the ire of the US authorities just to get her. It's a good job she regularly searches the dark web for her details purely on the off-chance that she'd been subjected to such an elaborate sting. It's a jungle out there after all and it pays to be super-careful.

Anyone suggesting there's a more straightforward explanation, I dunno, something involving extra-marital affairs maybe, is clearly barking up the wrong tree. Her explanation is airtight (or is that a dangerous phrase to use all things considered?)
I blame the English for subjugating this poor Scottish woman. Or something. As long as we can blame the English somehow.

rxtx

6,016 posts

211 months

Wednesday 19th August 2015
quotequote all
sa_20v said:
Been available for a while - piratebay.co.in had it this morning.

For most, getting the data downloaded won't help them much - if you want to make sense of it throw the five tables into a database - mySQL recognises the .dump files without issue. Ignore transactions and the other zip file which just contains company documents.

As the hackers described, most of these desperate people were only fleeced and never actually liaised with a real woman! biggrin
It's a mySQL dump, hence why it doesn't have an issue importing it smile

Apparently email addresses weren't sent a "click here to sign-up" validation mail, probably because the sort of person that signs up to that doesn't want a trail. That was a poor decision.

The claim that it's fake, and that the data comes from "other hacked sources - not AshleyMadison.com" is ambiguous. I believe they have several branded sites offering a similar service, probably all using the same back-end.

bad company

Original Poster:

18,640 posts

267 months

Wednesday 19th August 2015
quotequote all
rxtx said:
probably all using the same back-end.
So it's all ste then?

rxtx

6,016 posts

211 months

Wednesday 19th August 2015
quotequote all
bad company said:
So it's all ste then?
I don't know either way, but it's quite common for dating sites to have multiple brands that cater to different markets, whilst using the exact same hardware and software, just with a different front end.

rxtx

6,016 posts

211 months

Wednesday 19th August 2015
quotequote all
This comment on that mostly made up mail article made me laugh though,

"If you Googled me you would find all my personal details, including email address, and that's clearly what someone has done. It just shows how unsecure the internet is"

Yeah, it's the Internet that's 'unsecure' (sic) because you put all your details on it voluntarily you bellend.

sa_20v

4,108 posts

232 months

Wednesday 19th August 2015
quotequote all
rxtx said:
It's a mySQL dump, hence why it doesn't have an issue importing it smile
Surely not! biggrin



eharding

13,733 posts

285 months

Wednesday 19th August 2015
quotequote all
rxtx said:
Apparently email addresses weren't sent a "click here to sign-up" validation mail, probably because the sort of person that signs up to that doesn't want a trail. That was a poor decision.
Except that, as it happens, it *does* provide some degree of plausible deniability for anyone who has an email address that ended up in the database.

I doubt, however, that this was all part of some grand apocalypse-level master plan on the part of whoever designed the system in the expectation of a catastrophic security breach, rather than they were institutionally and habitually sloppy, and that this is just a chance outcome that might mitigate to a small degree what is, by any measure, a monumental multi-dimensional cluster-fook of epic proportions.

rxtx

6,016 posts

211 months

Wednesday 19th August 2015
quotequote all
sa_20v said:
Surely not! biggrin
Alright alright wink

eharding said:
Except that, as it happens, it *does* provide some degree of plausible deniability for anyone who has an email address that ended up in the database.

I doubt, however, that this was all part of some grand apocalypse-level master plan on the part of whoever designed the system in the expectation of a catastrophic security breach, rather than they were institutionally and habitually sloppy, and that this is just a chance outcome that might mitigate to a small degree what is, by any measure, a monumental multi-dimensional cluster-fook of epic proprotions.
I agree, that was just an accidental outcome from an initial sloppy design decision.

RogerExplosion

1,130 posts

191 months

Thursday 20th August 2015
quotequote all
Goodness I've just seen a list of all Australian public servants that have used their work email addresses. Absolute Madness. One of my clients is on there. Muppet.

Don

28,377 posts

285 months

Thursday 20th August 2015
quotequote all
So I went to try their sign up procedure. You DO have to supply an email address - and, presumably, if you actually want it to work it would need to be a genuine one....or at least...one you can get to the contents of the Inbox.

This is where the wonderful services of mailinator (Google and read their FAQ) can be used to test such nonsense.

Those email addresses don't need to be genuine at all. However - the vast, VAST majority will be. Oops.

NicD

3,281 posts

258 months

Thursday 20th August 2015
quotequote all
eharding said:
Except that, as it happens, it *does* provide some degree of plausible deniability for anyone who has an email address that ended up in the database.

I doubt, however, that this was all part of some grand apocalypse-level master plan on the part of whoever designed the system in the expectation of a catastrophic security breach, rather than they were institutionally and habitually sloppy, and that this is just a chance outcome that might mitigate to a small degree what is, by any measure, a monumental multi-dimensional cluster-fook of epic proportions.
I would expect they considered this and went with the plausible deniability.

Pistom

4,976 posts

160 months

Thursday 20th August 2015
quotequote all
rxtx said:
This comment on that mostly made up mail article made me laugh though,

"If you Googled me you would find all my personal details, including email address, and that's clearly what someone has done. It just shows how unsecure the internet is"

Yeah, it's the Internet that's 'unsecure' (sic) because you put all your details on it voluntarily you bellend.
It is almost impossible to keep your personal details private. If you sit and home and make no communications with the outside world then yes, you will have anonymity.


hornetrider

63,161 posts

206 months

Thursday 20th August 2015
quotequote all
rxtx said:
This comment on that mostly made up mail article made me laugh though,

"If you Googled me you would find all my personal details, including email address, and that's clearly what someone has done. It just shows how unsecure the internet is"

Yeah, it's the Internet that's 'unsecure' (sic) because you put all your details on it voluntarily you bellend.
And now we have websites set up where one can 'input your email address and see if it's in the Ashley Madison hack'.

Really? People are going to plug a genuine email address into a random website set up on the back of this hack? They deserve all they get laugh

jjlynn27

7,935 posts

110 months

Thursday 20th August 2015
quotequote all
rxtx said:
I agree, that was just an accidental outcome from an initial sloppy design decision.
Or, it's planed design implemented to boost 'number of registered members'. Who cares about email address as long as they sign up with real (or at least valid/chargeable) credit card. Either way, guy made millions on the back of a promise that, for probably 95% of members, never materialized, who'll probably not go CAB to complain.

Soov535

35,829 posts

272 months

Thursday 20th August 2015
quotequote all
Here's the serachable database.

This is genuine - I've checked it against the TOR dumps.



https://ashley.cynic.al/


Davie_GLA

6,525 posts

200 months

Thursday 20th August 2015
quotequote all
Soov535 said:
Here's the serachable database.

This is genuine - I've checked it against the TOR dumps.



https://ashley.cynic.al/
What we need is a wildcard option for checking out those at the place you work wink

  • @domain.com

Soov535

35,829 posts

272 months

Thursday 20th August 2015
quotequote all
Davie_GLA said:
Soov535 said:
Here's the serachable database.

This is genuine - I've checked it against the TOR dumps.



https://ashley.cynic.al/
What we need is a wildcard option for checking out those at the place you work wink

  • @domain.com
I can think of one person I hope is on there.... LOL!

Davie_GLA

6,525 posts

200 months

Thursday 20th August 2015
quotequote all
Soov535 said:
I can think of one person I hope is on there.... LOL!
Dammit. Asterix don't display. but go on. geez a cloo?

Asterix

24,438 posts

229 months

Thursday 20th August 2015
quotequote all
Eh?

Davie_GLA

6,525 posts

200 months

Thursday 20th August 2015
quotequote all
Asterix said:
Eh?
Ha! SPeak of him and he sure to appear!

I meant the wee star (shift + 8). It created a bullet point on the forum.

So where do i get the raw data?