• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Data Privacy   »   Impact Team to Ashley Madison – Shut down or Else!

Impact Team to Ashley Madison – Shut down or Else!

  • Posted on:July 20, 2015
  • Posted in:Data Privacy, Hacks, Security
  • Posted by:Christopher Budd (Global Threat Communications)
0

Brian Krebs reports that Ashley Madison, a self-proclaimed site for extra-marital affairs, has been successfully breached. The attackers, a group calling themselves the “Impact Team,” claim they’ve stolen a significant trove of internal information that includes personal details on some, if not all, of the site’s 37 million users. Avid Life Media (ALM), who owns Ashley Madison and other adult-oriented sites such as Established Men and Cougar Life, has confirmed the attack, but not the scope of the data theft.

The attackers have issued a simple set of demands: close down AshleyMadison and Established Men immediately, or they will release users’ personal details. Interestingly, their demands do not extend to other ALM-owned sites like Cougar Life.

This isn’t the first online attack to result in an act of extortion. Companies have been threatened for years with crippling distributed denial of service (DDoS) attacks that could take them offline if they didn’t pay up. Three things make this attack and these demands:

  • Motivation behind these attacks seem to be driven by a kind of moralistic “hacktivism”
  • It’s the latest in a string of attacks and data theft that shifts victim’s consequences from pure money loss (like credit card theft) into the realm of life-impacting events (like blackmail)
  • The first instance of extortion where the price asked is the life of the business itself

Analyzing the apparent motivation for this attack, we only need to look at the announcement/threat posted by the Impact Team to see that this is a “hacktivist” attack with a new twist (two actually). They call out the sites that enable bad or immoral behavior (infidelity in the case of AshleyMadison, prostitution/exploitation in the case of Established Men). The Impact Team also calls out ALM on its claim to “promise secrecy but [not] deliver.” The Impact Team cites ALM’s promise to “scrub” subscriber details for a US $19 fee was bogus and that user data is still stored. In this last regard, the hack is similar to the recent Hacking Team attack – an act of vigilantism against bad corporate behavior.

In terms of consequences, we’ve seen the ground shift in the past 12 months. A year ago, in the wake of the Target and other retail data breaches, people were concerned their credit/debit card data had been lost. Now, in the wake of the IRS and OPM compromises, we are worried about much more serious, personal data leaks – information that could be used in a worst-case for blackmail with much more serious real-world consequences than just the loss of some money.

It’s the high-risk associated with collecting and storing comprehensive sensitive data that is giving these attackers the courage to make the boldest online extortion demand seen yet—“go out of business or face the consequences of us releasing this data.” The nature of the stolen data makes the threat credible and the possibility that going out of business may be the lesser of two evils. It also brings us back to the motivations of these attackers. They don’t want money, they want these sites eliminated.

As of right now, we don’t know how this will play out. We do know, however, that this represents another significant escalation in terms of what attackers are doing and could do. It’s no longer just about credit cards and money, it’s about people’s lives and livelihoods.

Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.

Related posts:

  1. 2016: The Year of Online Extortion
  2. The rise of data breach dumps
  3. Stop Targeted Attacks Dead in Their Tracks with an Incident Response Team
  4. How GDPR will impact businesses outside of the EU

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.