• About Geek Beat
  • Advertise
  • Contact
  • Login
  • Facebook
  • Instagram
  • RSS
  • Twitter
  • YouTube

Geek Beat

One of the world’s most recognizable technology news brands, delivering daily tech news, tips, and reviews.

  • News
    • Apple
    • CES
    • Editor’s Choice
    • Google
    • How To’s
    • Microsoft
    • Music
    • Mobility
    • NABShow
    • Photography
  • Episodes
  • Reviews
  • Videos
  • Connect With Us
Home > News > Everything We Know About the Ashley Madison Hack – Plus Find Out If YOU’RE On The List

Everything We Know About the Ashley Madison Hack – Plus Find Out If YOU’RE On The List

August 19, 2015 by John P.

The saga continues with regards to the Ashley Madison ongoing hack debacle. Hackers made good on their threat to release all of the Ashley Madison cheater database information yesterday, and everyone is reacting. The release was made available on a .onion darknet site, and is now available on bittorrent (keep reading for the link and instructions).

Ashley Madison Email Checkers

First things first. About 36 million people are really nervous. If you’re one of them, you can use one of the following sites to check and see if your data was compromised. Or, you can check up on other people by entering an email address.

I would warn you that although these are supposed to be checking real databases, its also probable that they are building a database of every email being checked. I would.

  • https://ashley.cynic.al/
  • http://www.trustify.info/check

If you don’t trust them, but you happen to be handy with a database and you have a HUGE amount of bandwidth, you can download Bittorrent, and then get the full compressed 9.6GB database leak to analyze yourself.

Where and How to Get the Ashley Madison Database

  1. Download and install Bittorrent.
  2. AFTER installing it, click on this link to add the Ashley Madison Torrent to your downloads.
  3. Select a suitable download location, and then wait. It’s going to take a while.
  4. In case you are unfamiliar with Bittorrent, be aware that while you are downloading parts from all over the place, you are also uploading parts to others simultaneously.

Once you have the file, you will need to uncompress it. It will be nearly 36GB in total. Very few text editors will read it, however you can download the free EmEditor to open the files with ease on Windows or HexFiend on Mac.

An Analysis of the Ashley Madison Data

Here are things we know about the data so far.

  • 33 million accounts and user personal information have leaked
  • 36 million email addresses have leaked
  • Passwords were fortunately encrypted, so risk is minimized.
  • The leak contains the names, street addresses, email addresses, phone number and credit card transactions of nearly 33 million accounts along with valid Credit Card info.
  • The data was taken on July, 11 2015
  • 28-million men vs 5 million woman, according to the “gender” field in the database (with 2-million undetermined).
  • 15,000 of the e-mail addresses are hosted by US government and military servers using the .gov and .mil top-level domains
  • Credit-card transactions appear to be predominantly male names.
  • Full account information is contained including name, email, password hash, dating information, height, weight, addresses, and GPS coordinates.
  • This means even if you used a fake name, your GPS location may have been shared by an app.
  • Hackers will be able to “crack” many of the passwords when users chose weak ones, but strong passwords are safe.
  • Approximately 250,000 deleted accounts appear to have the password removed.
  • Partial credit card transaction data, but not the full credit card number, is present along with full names and addresses.
  • Employees at companies such as Amazon, Boeing and Sony; governments agencies in the UK, Canada and France; defence contractors like Raytheon and BAE Systems; and banks including JP Morgan, Bank of America and Citigroup, IBM, institutions such as the Catholic church and universities including Harvard and Yale.

Contents of the Ashley Madison Data Dump

There were a number of files released, the contents of which are summarized here:

Ashley Madison File List

74ABAA38.txt

This file contains the GPG public key to check that all files were created by the author and *not* modified by some third party.

README

The readme file contains the following text:

_______ _____ __ __ ______ _ _ _ _____ _
|__ __|_ _| \/ | ____( ) | | | | __ \| |
| | | | | \ / | |__ |/ ___ | | | | |__) | |
| | | | | |\/| | __| / __| | | | | ___/| |
| | _| |_| | | | |____ \__ \ | |__| | | |_|
|_| |_____|_| |_|______| |___/ \____/|_| (_)
Avid Life Media has failed to take down Ashley Madison and Established Men. We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data.

Find someone you know in here? Keep in mind the site is a scam with thousands of fake female profiles. See ashley madison fake profile lawsuit; 90-95% of actual users are male. Chances are your man signed up on the world’s biggest affair site, but never had one. He just tried to. If that distinction matters.

Find yourself in here? It was ALM that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends. Embarrassing now, but you’ll get over it.

Any data not signed with key 6E50 3F39 BA6A EAAD D81D ECFF 2437 3CD5 74AB AA38 is fake.

CreditCardTransactions.7z

Contains ALL credit card transactions from the past 7 years including names, street address, amount paid and email address of every transaction.

am_am.dump

Contains 32 million user first/last names, street address, phone numbers, relationship status, preferences and personal data such as if they drink, smoke, what their their security question is, date of birth, nickname, and more.

ashleymadisondump.7z

Contains administrative documents.

aminno_member.dump

Additional personal data.

aminno_member_email.dump

Contains 36 million email addresses.

member_details.dump

Physical description: eyes color, weight, height, hair color, body type, “ethnicity”, and more.

member_login.dump

Contains more than 30 million usernames + hashed passwords. The passwords are hashed with the bcrypt algorithm which makes a global attack on the password very unlikely.

Additional Updates

  • Spammers have now begun attempting to extort money from victims of the leak, exactly as I previously predicted.
    AshleyMadison-extortion
  • Two suicides in Canada have been allegedly linked to the AshleyMadison information release. Names have not been disclosed.
  • Police have set up a Twitter account, @AMCaseTPS, and hashtag, #AMCaseTPS, in a bid to gather information about the hack from members of the public.
  • A class action lawsuit has been filed in the U.S. District Court, Central District of California No. 15-cv-06405

Got Any More Info?

If you’ve got any additional info, drop it in the comments below and share with the rest of us. 😉

Filed Under: News Tagged With: AshleyMadison, hacks

About John P.

John P. is CEO of Livid Lobster and co-host of Geek Beat TV. You can also find him on Twitter and Google+.

Comments

  1. Somebodysomeplace says

    August 25, 2015 at 10:54 am

    The GPS in most cases will be the location of the IP address provider not the actual location of the Ip address being used. The only way someone like you would be readily traceable from the database is by someone who knows or can establish your connection to the email address in the database. Another 20GB of data though has now reportedly been dumped and no mention has been made if any of the stolen data includes ip address logs of the ips used to connect to specific accounts (a problem mostly for people with static ips that still have the same ones) or photos.

  2. Somebodysomeplace says

    August 25, 2015 at 10:42 am

    Not really sure how you would be able to “extort money” using information that is already in the public domain. That would only work before it was released.

    • Yike says

      September 9, 2015 at 9:25 pm

      You apparently don’t know how stupidity works. The people who know they are “guilty” and not technically savvy might pony up the cash. I’m sure there are some who did.

  3. Somebodysomeplace says

    August 25, 2015 at 10:40 am

    So for people using TOR and not wanting to use bit torrent, what’s the original .onion address?

    • John P. says

      August 26, 2015 at 10:30 am

      Sorry, I never found it. And I’m not sure it even still exists. I think they put it there until someone grabbed it and put it on a torrent site. But I haven’t verified that…

  4. I was never there says

    August 23, 2015 at 4:18 am

    That is exactly the reason 10 minute mail exists. Whoever used their real, everyday email is a moron.

  5. Jason (not really) says

    August 22, 2015 at 4:15 pm

    Interesting tidbit to share – so my (fake) e-mail address is in the database, which is correct as I did sign up. I never made a CC transaction, and I never replied to any correspondence, or initiated any. I signed in 5 or 6 times to see what the profiles looked like, that was it.

    I downloaded the database….and it takes a LONG while to make heads or tails of it all (this article was a huge help). I went into am_am.dump (the magic one that would have all your info), and while it took a long while, I found my profile. Along with my write up – it was mine for sure. Anyway….the GPS coordinates are about 20 miles from my home, ironically it would lead you to a church. I only logged in using IE In-Private browser, and I may have been connected to my work VPN (been a while, I really don’t recall either way).

    Bottome line, they have me in there, but I never gave a real name and never used a CC, so that they don’t have. And the address was way off.

    • Dr. Fletch says

      August 23, 2015 at 10:54 am

      Interesting! I wonder, was it the coordinates from your time of registration or if it recorded each login “location”? I’ve heard conflicting things about this–also about what the unpaid, fake name, fake email folks had exposed. How long before we see a map with true addresses (or assumed anyway), I wonder. That’ll, unfortunately, bring on a whole slew of new people thrust into the light. Very sad business.

  6. Lee Pinney says

    August 20, 2015 at 12:23 am

    Is there truth to the old saying that cheaters never prosper?

Recent Posts

  • Best CBD Oil Brands to Buy
  • Go Mic Mobile Wireless System for Mobile Filmmakers
  • A RAY OF LIGHT
  • Keep Devices Charged Anywhere in the World with the Twist Plus World Charging Station
  • Final Leaked iPhone 7 Details Before The Big Event

Recent Comments

  • Ricardo Garza on Streambox Announces 360 Live Video Streaming to YouTube
  • Sunbya on Review: Blue Lola Headphones bring unparalleled quality
  • Jay Anderson on CES2016 – Autel Robotics X-Star Quadcopters
  • Scott Ellis on CES2016 – The Parrot DISCO – The Worlds First Fixed Wing Consumer Drone
  • Ricardo Garza on CES2016 – The Parrot DISCO – The Worlds First Fixed Wing Consumer Drone

Tags

3D Amazon Apple apps audio bluetooth business CE Line Shows 2013 CES computers fitness gadgets games gaming geek geek beat GeekBeat geek house Google health how-to ios john p. kickstarter Microsoft mobile Mobility Music nabshow new building Other photography Reviews robots Samsung social media speakers storage tech technology travel Tutorial vehicles video vlog

Copyright © 2023 · Geek Media on Genesis Framework · WordPress · Log in