{"id":22471,"date":"2023-07-13T16:17:04","date_gmt":"2023-07-14T00:17:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16201\/"},"modified":"2023-07-13T16:17:04","modified_gmt":"2023-07-14T00:17:04","slug":"news-16201","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/07\/13\/news-16201\/","title":{"rendered":"SEO Expert Hired and Fired By Ashley Madison Turned on Company, Promising Revenge"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Thu, 13 Jul 2023 21:45:02 +0000<\/strong><\/p>\n<p><em>[This is Part II of <a href=\"https:\/\/krebsonsecurity.com\/2023\/07\/top-suspect-in-2015-ashley-madison-hack-committed-suicide-in-2014\/\" target=\"_blank\" rel=\"noopener\">a story published here last week<\/a> on reporting that went into a new <strong>Hulu<\/strong> documentary series on the 2015 Ashley Madison hack.]<\/em><\/p>\n<p>It was around 9 p.m. on Sunday, July 19, when I received a message through the contact form on KrebsOnSecurity.com that the marital infidelity website AshleyMadison.com had been hacked. The message contained links to confidential Ashley Madison documents, and included a manifesto that said a hacker group calling itself the <strong>Impact Team<\/strong> was prepared to leak data on all 37 million users unless Ashley Madison and a sister property voluntarily closed down within 30 days.<\/p>\n<div id=\"attachment_31653\" style=\"width: 760px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" aria-describedby=\"caption-attachment-31653\" decoding=\"async\" class=\" wp-image-31653\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/07\/impactteam-580x657.png\" alt=\"\" width=\"750\" height=\"850\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/07\/impactteam-580x657.png 580w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/07\/impactteam.png 671w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p id=\"caption-attachment-31653\" class=\"wp-caption-text\">A snippet of the message left behind by the Impact Team.<\/p>\n<\/div>\n<p>The message included links to files containing highly sensitive information, including snippets of leaked user account data, maps of internal AshleyMadison company servers, employee network account information, company bank account data and salary information.<\/p>\n<p>A master employee contact list was among the documents leaked that evening. Helpfully, it included the cell phone number for <strong>Noel Biderman<\/strong>, then the CEO of Ashley Madison parent firm <strong>Avid Life Media<\/strong> (ALM). To my everlasting surprise, Biderman answered on the first ring and acknowledged they&#8217;d been hacked without even waiting to be asked.<\/p>\n<p>\u201cWe\u2019re on the doorstep of [confirming] who we believe is the culprit, and unfortunately that may have triggered this mass publication,\u201d Biderman told me on July 19, just minutes before I published <a href=\"https:\/\/krebsonsecurity.com\/2015\/07\/online-cheating-site-ashleymadison-hacked\/\" target=\"_blank\" rel=\"noopener\">the first known public report about the breach<\/a>. \u201cI\u2019ve got their profile right in front of me, all their work credentials. It was definitely a person here that was not an employee but certainly had touched our technical services.\u201d<\/p>\n<p>On Aug 18, 2015, the Impact Team posted a \u201cTime\u2019s up!\u201d message online, along with links to 60 gigabytes of Ashley Madison user data. The data leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. Many other users lost their jobs or their marriages. To this day, nobody has been charged in the hack, and incredibly Ashley Madison remains a thriving company.<\/p>\n<h2>THE CHAOS MAKER<\/h2>\n<p>The former employee that Biderman undoubtedly had in mind on July 19, 2015 was <strong>William Brewster Harrison<\/strong>, a self-described expert in search engine optimization (SEO) tricks that are designed to help websites increase their rankings for various keywords in Google and other search engines.<\/p>\n<p>It is evident that Harrison was Biderman&#8217;s top suspect immediately after the breach became public because &#8212; in addition to releasing data on 37 million users a month later in August 2015 &#8212; the hackers also dumped three years worth of email they stole from Biderman. And Biderman&#8217;s inbox is full of messages about hate-filled personal attacks from Harrison.<\/p>\n<p>A Native of Northern Virginia, Harrison eventually settled in North Carolina, had a son with his then-wife, and started a fence-building business. ALM hired Harrison in March 2010 to promote its various adult brands online, and it is clear that one of his roles was creating and maintaining female profiles on Ashley Madison, and creating <a href=\"https:\/\/web.archive.org\/web\/20100623223703\/http:\/\/www.marriage-playground.com:80\/\" target=\"_blank\" rel=\"noopener\">blogs<\/a> that were made to look like they were written by women who&#8217;d just joined Ashley Madison.<\/p>\n<div id=\"attachment_64202\" style=\"width: 321px\" class=\"wp-caption alignright\"><a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/07\/willharrisonfb.png\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-64202\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-64202\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/07\/willharrisonfb.png\" alt=\"\" width=\"311\" height=\"501\" \/><\/a><\/p>\n<p id=\"caption-attachment-64202\" class=\"wp-caption-text\">A selfie that William B. Harrison posted to his Facebook page in 2013 shows him holding a handgun and wearing a bulletproof vest.<\/p>\n<\/div>\n<p>It appears Harrison was working as an affiliate of Ashley Madison prior to his official employment with the company, which suggests that Harrison had already demonstrated he could drive signups to the service and help improve its standing in the search engine rankings.<\/p>\n<p>What is less clear is whether anyone at ALM ever performed a basic background check on Harrison before hiring him. Because if they had, the results almost certainly would have given them pause. Virginia prosecutors charged the young 20-something Harrison with a series of misdemeanors, including trespassing, unlawful entry, drunk in public, and making obscene phone calls.<\/p>\n<p>In 2008, North Carolina authorities charged Harrison with criminal extortion, a case that was transferred to South Carolina before ultimately being dismissed. In December 2009, Harrison faced charges of <a href=\"https:\/\/en.wikipedia.org\/wiki\/False_imprisonment\" target=\"_blank\" rel=\"noopener\">false imprisonment<\/a>, charges that were also dropped by the local district attorney.<\/p>\n<p>By the time Ashley Madison officially <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/07\/willhired.png\" target=\"_blank\" rel=\"noopener\">hired him<\/a>, Harrison&#8217;s life was falling apart. His fence business had failed, and he&#8217;d just filed for bankruptcy. Also, his marriage had soured, and after a new arrest for driving under the influence, he was in danger of getting divorced, losing access to his son, and\/or going to jail.<\/p>\n<p>It also seems likely that nobody at ALM bothered to look at the dozens of domain names registered to Harrison&#8217;s various Vistomail.com email addresses, because had they done so they likely would have noticed two things.<\/p>\n<p>One is that Harrison had a history of creating websites to lambaste companies he didn&#8217;t like, or that he believed had slighted him or his family in some way. Some of these websites included content that defamed and doxed executives, such as <strong>bash-a-business[.]com<\/strong>, <strong>google-your-business[.]com<\/strong>, <strong>contact-a-ceo[.]com<\/strong>, lowes-is-a-cancer[.]com (according to Harrison, the home improvement chain once employed his wife).<\/p>\n<p>A background check on Harrison&#8217;s online footprint also would have revealed he was a self-styled rapper who claimed to be an active menace to corporate America. Harrison&#8217;s website <strong>lyrical-gangsta[.]com<\/strong> included a number of works, such as &#8220;<strong>Slim Thug &#8212; I Run &#8212; Remix Spoof<\/strong>,&#8221; which are replete with menacing words for unnamed corporate executives:<\/p>\n<p><em>[HOOK]<\/em><br \/> <em>I surf the net all night n day (the web love thug)<\/em><br \/> <em>cuz I still surf the net all night n day<\/em><br \/> <em>yuhh I type for my mind, got smart for my ego<\/em><br \/> <em>still running circles round them, what&#8217;s good?<\/em><br \/> <em>cuz I still surf, the net all night n day,<\/em><br \/> <em>I cant stay away.<\/em><\/p>\n<p><em>They don&#8217;t make to [sic] many hackers like me<\/em><br \/> <em>bonafide hustler certified G<\/em><br \/> <em>still pumpin&#8217; the TOP 10 results<\/em><br \/> <em>if you got the right dough!<\/em><br \/> <em>think the results are fake? sucka Google ME<\/em><br \/> <em>smarter than executives, bigger then Wal-Mart<\/em><br \/> <em>Nelly strugglin&#8217; with the fact that I&#8217;m #1 NOW<\/em><br \/> <em>street boys know me, ain&#8217;t nuttin&#8217; new<\/em><br \/> <em>about to make my mill, with an all new crew<\/em><br \/> <em>I-95 execs don&#8217;t know what to do, or where to go<\/em><br \/> <em>watchin them stocks evaporate all their dough<\/em><br \/> <em>I already left the hood, got up off the streets<\/em><br \/> <em>its in my blood im a gangsta till Im deceased<\/em><\/p>\n<p><em>moving lumber for money or typin&#8217; in a zone<\/em><br \/> <em>all night hackin&#8217; till 6 in the mornin<\/em><br \/> <em>that shit im focusin&#8217; on, stronger then cologne<\/em><br \/> <em>you can prolly smell the jealousy<\/em><br \/> <em>through your LCD screen<\/em><br \/> <em>if you still broke&#8211; better work for some green<\/em><br \/> <em>called them Fortune execs on that legal bluff<\/em><br \/> <em>cuz the Feds busy raidin other stuff<\/em><br \/> <em>Imma run the Net til im six feet under<\/em><br \/> <em>I&#8217;m a leave my mark &#8212; no reason to wonder<\/em><br \/> <em>(Yea Yea)<\/em><span id=\"more-64197\"><\/span><\/p>\n<div id=\"attachment_64206\" style=\"width: 628px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-64206\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-64206\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/07\/willsrap2.png\" alt=\"\" width=\"618\" height=\"759\" \/><\/p>\n<p id=\"caption-attachment-64206\" class=\"wp-caption-text\">Some of the anti-corporate rhymes busted by Harrison&#8217;s hacker\/rapper alter ego &#8220;Chaos Dog.&#8221; Image: Archive.org.<\/p>\n<\/div>\n<p>The same theme appears in another rap (&#8220;The Hacker Backstage&#8221;) penned by Harrison&#8217;s rapper alter ego &#8212; &#8220;Chaos Dog:&#8221;<\/p>\n<p><em>&#8230;this hacker was born to write<\/em><br \/> <em>bust off the rhymes and watch em take flight<\/em><br \/> <em>you know all about them corporate jets<\/em><br \/> <em>and handing out pinkslips without regrets<\/em><br \/> <em>oversized companies are the problem<\/em><\/p>\n<p><em>well, I&#8217;ve got a solution<\/em><br \/> <em>It&#8217;s called good ol&#8217; fashioned retribution<\/em><br \/> <em>file bankruptcy, boycott you like Boston colonists<\/em><br \/> <em>Corporate America cant stop this Eminem style columnist<\/em><br \/> <em>2pac would have honored my style<\/em><br \/> <em>Im the next generation of hacker inspiration<\/em><br \/> <em>Americans don&#8217;t want a corporate nation<\/em><br \/> <em>All that DOW Jones shit is a dying sensation<\/em><\/p>\n<p>In addition to pimping Ashley Madison with fake profiles and phony user blogs, it appears Harrison also went after the company&#8217;s enemies during the brief time he was an employee. As noted in Part I of this story, Harrison used multiple pseudonymous Vistomail.com email addresses to harass the owners of <strong>AshleyMadisonSucks[.]com<\/strong> into selling or shutting down the site.<\/p>\n<p>When the owner of AshleyMadisonSucks[.]com refused to sell the domain, he and his then-girlfriend were subject to an unrelenting campaign of online harassment and blackmail. It now appears those attacks were perpetrated by Harrison, who sent emails from different accounts at the free email service <strong>Vistomail<\/strong> pretending to be the domain owner, his then-girlfriend and their friends. Harrison even went after the domain owner&#8217;s lawyer and wife, listing them both on his Contact-A-CEO[.]com website.<\/p>\n<h2>TURNABOUT IS FAIR PLAY<\/h2>\n<p>Things started going sideways for Ashley Madison when Harrison&#8217;s employment contract was terminated in November 2011. The leaked emails do not explain why Harrison was fired, but his mercurial temperament likely played a major role. According to Harrison, it was because he had expressed some moral reservations with certain aspects of his duties, although he was not specific on that point and none of this could be confirmed.<\/p>\n<p>Shortly after Harrison was fired, the company&#8217;s executives began noticing that <strong>Google<\/strong> was auto-completing the words &#8220;Jew&#8221; and &#8220;Jewish&#8221; whenever someone searched for Biderman&#8217;s name. The results returned when one accepted Google&#8217;s recommended search at the time filled the first page with links to <strong>Stormfront<\/strong>, a far-right, neo-Nazi hate group. The company strongly suspected someone was using underhanded SEO techniques to slander and attack its CEO.<\/p>\n<p>In July 2022, KrebsOnSecurity published <a href=\"https:\/\/krebsonsecurity.com\/2022\/07\/a-retrospective-on-the-2015-ashley-madison-breach\/\" target=\"_blank\" rel=\"noopener\">a retrospective on the 2015 Ashley Madison breach<\/a> which found that Biderman had become the subject of increasing ire from members of Stormfront and other extremists groups in the years leading up to the hack. According to the neo-Nazi groups, Biderman was a worthy target of their harassment not just because he was a successful Jewish CEO, but also because his company was hellbent on destroying Christian morals and families.<\/p>\n<p>Biderman&#8217;s leaked emails show that in February 2021 he hired <strong>Brian Cuban<\/strong> &#8212; the attorney brother of <strong>Mark Cuban<\/strong>, the owner of the Dallas Mavericks and one the main &#8220;sharks&#8221; on the ABC reality television series <strong>Shark Tank<\/strong>. Through Cuban, Ashley Madison appealed their case to both Google and to the Anti-Defamation League, but neither was apparently able or willing to help.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-60580\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/ashmadbill.png\" alt=\"\" width=\"750\" height=\"408\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/ashmadbill.png 616w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/ashmadbill-370x200.png 370w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/p>\n<p>Also in early January 2012, Biderman and other Ashley Madison executives found themselves inundated with anonymous Vistomail.com emails that were replete with profanity and slurs against Jews. Although he used fake names and email addresses, Harrison made little effort to hide his identity in several of these nastygrams.<\/p>\n<p>One particularly ugly message from Harrison even included a link to a Youtube video he&#8217;d put online of his young son playing basketball for a school team. That Youtube video was included in an email wherein Harrison &#8211; then separated from his wife &#8212; lamented all the hours he spent working for Ashley Madison up in Canada instead of spending time with his son.<\/p>\n<p>Harrison then turned to making threatening phone calls to Ashley Madison executives. In one incident in March 2012, Harrison called the company&#8217;s former director of Human Resources using a caller ID spoofing service to make it look like he was calling from inside the building.<\/p>\n<p>ALM&#8217;s lawyers contacted the Toronto police in response to Harrison&#8217;s harassment.<\/p>\n<p>&#8220;For Will to have disguised his phone number as Mark\u2019s strongly suggest he has hacked my email, legal counsel for the opposing side in a perceived legal dispute,&#8221; ALM VP and general counsel Mike Dacks wrote in a letter to a detective at the Toronto Police. &#8220;Over the months of his many hundreds of emails he alluded a number of times to undertaking cyberattacks against us and this was noted in my original report to police.&#8221;<\/p>\n<p>Based on the exchanges in Bidernman&#8217;s inbox it appears those appeals to the Toronto authorities were successful in having Harrison barred from being able to enter Canada.<\/p>\n<p>ALM also contacted a detective in Harrison&#8217;s home county in North Carolina. But when the local police paid a visit to Harrison&#8217;s home to follow up on the harassment complaints, Harrison fled out his back porch, injuring himself after jumping off the second-story deck.<\/p>\n<p>It is unclear if the police ever succeeded in interviewing Harrison in response to the harassment complaints from ALM. The Raleigh police officer contacted by ALM did not respond to requests for information. But the visit from the local cops only seemed to embolden and anger Harrison even more, and Biderman&#8217;s emails indicate the harassment continued after this incident.<\/p>\n<h2>HUMAN DECOYS<\/h2>\n<p>Then in August 2012, the former sex worker turned blogger and activist <strong>Maggie McNeill<\/strong> published screenshots from an internal system that Ashley Madison used called the &#8220;<strong>Human Decoy Interface<\/strong>,&#8221; which was a fancy way of describing a system built to manage phony female accounts on the service.<\/p>\n<p>The screenshots appeared to show that a great many female accounts were in fact bots designed to bring in paying customers. Ashley Madison was always free to join, but users had to pay if they wished to chat directly with other users.<\/p>\n<p>Although Harrison had been fired nearly a year earlier, Biderman&#8217;s leaked emails show that Harrison&#8217;s access to Ashley Madison&#8217;s internal tools wasn&#8217;t revoked until after the screenshots were posted online and the company began reviewing which employee accounts had access to the Human Decoy Interface.<\/p>\n<p>\u201cWho or what is\u00a0<strong>asdfdfsda@asdf.com<\/strong>?,\u201d Biderman asked, after being sent a list of nine email addresses.<\/p>\n<p>\u201cIt appears to be the email address Will used for his profiles,\u201d the IT director replied.<\/p>\n<p>\u201cAnd his access was never shut off until today?,\u201d asked the company\u2019s general counsel Mike Dacks.<\/p>\n<h2>TRUTH BOMBS<\/h2>\n<p>Biderman&#8217;s leaked emails suggest that Harrison stopped his harassment campaign sometime after 2012. A decade later, KrebsOnSecurity sought to track down and interview Harrison. Finding nobody at his former addresses and phone numbers in North Carolina, KrebsOnSecurity wound up speaking with Will&#8217;s stepmother, <strong>Tena Nauheim<\/strong>, who lives with Will&#8217;s dad in Northern Virginia.<\/p>\n<p>Nauheim quickly dropped two big truth bombs after patiently listening to my spiel about why I was calling and looking for Mr. Harrison. The first was that Will was brought up Jewish, although he did not practice the faith: A local rabbi and friend of the family gave the service at Will&#8217;s funeral in 2014.<\/p>\n<p>Nauheim also shared that her stepson had killed himself in 2014, shooting himself in the head with a handgun. Will&#8217;s mother discovered his body.<\/p>\n<p>&#8220;Will committed suicide in March 2014,&#8221; Nauheim shared. &#8220;I&#8217;ve heard all those stories you just mentioned. Will was severely mentally ill. He was probably as close to a sociopath as I can imagine anyone being. He was also a paranoid schizophrenic who wouldn&#8217;t take his medication.&#8221;<\/p>\n<p>William B. Harrison died on March 5, 2014, <em>nearly 16 months before The Impact Team announced they&#8217;d hacked Ashley Madison<\/em>.<\/p>\n<p>Nauheim said she constantly felt physically threatened when Will was around. But she had trouble believing that her stepson was a raging anti-Semite. She also said she thought the timing of Will&#8217;s suicide effectively ruled him out as a suspect in the 2015 Ashley Madison hack.<\/p>\n<p>&#8220;Considering the date of death, I\u2019m not sure if he\u2019s your guy,&#8221; Nauheim offered toward the end of our conversation.<\/p>\n<p>[There is one silver lining to Will Harrison&#8217;s otherwise sad tale: His widow has since remarried, and her new husband agreed to adopt their son as his own.]<\/p>\n<h2>ANALYSIS<\/h2>\n<p>Does Harrison&#8217;s untimely death rule him out as a suspect, as his stepmom suggested? This remains an open question. In <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2023\/07\/noelbuddy.png\" target=\"_blank\" rel=\"noopener\">a parting email to Biderman in late 2012<\/a>, Harrison signed his real name and said he was leaving, but not going away.<\/p>\n<p>&#8220;So good luck, I&#8217;m sure we&#8217;ll talk again soon, but for now, I&#8217;ve got better things in the oven,&#8221; Harrison wrote. &#8220;Just remember I outsmarted you last time and I will outsmart you and out maneuver you this time too, by keeping myself far far away from the action and just enjoying the sideline view, cheering for the opposition.&#8221;<\/p>\n<p>Nothing in the leaked Biderman emails suggests that Ashley Madison did much to revamp the security of its computer systems in the wake of Harrison&#8217;s departure and subsequent campaign of harassment &#8212; apart from removing an administrator account of his a year after he&#8217;d already left the company.<\/p>\n<p>KrebsOnSecurity found nothing in Harrison&#8217;s extensive domain history suggesting he had any real malicious hacking skills. But given the clientele that typically employed his skills &#8212; the adult entertainment industry &#8212; it seems likely Harrison was at least conversant in the dark arts of &#8220;Black SEO,&#8221; which involves using underhanded or else downright illegal methods to game search engine results.<\/p>\n<p>Armed with such experience, it would not have been difficult for Harrison to have worked out a way to maintain access to working administrator accounts at Ashley Madison. If that in fact did happen, it would have been trivial for him to sell or give those credentials to someone else.<\/p>\n<p>Or to <em>something<\/em> else. Like Nazi groups. As KrebsOnSecurity reported last year, in the six months leading up to the July 2015 hack, Ashley Madison and Biderman\u00a0became a frequent subject of derision across multiple neo-Nazi websites.<\/p>\n<p>On Jan. 14, 2015, a member of the neo-Nazi forum Stormfront posted a lively thread about Ashley Madison in the general discussion area titled, \u201cJewish owned dating website promoting adultery.\u201d<\/p>\n<p>On July 3, 2015,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Andrew_Anglin\" target=\"_blank\" rel=\"noopener\">Andrew Anglin<\/a>, the editor of the alt-right publication\u00a0<a href=\"https:\/\/www.splcenter.org\/fighting-hate\/extremist-files\/individual\/andrew-anglin\" target=\"_blank\" rel=\"noopener\">Daily Stormer<\/a>, posted excerpts about Biderman from a story titled, \u201cJewish Hyper-Sexualization of Western Culture,\u201d which referred to Biderman as the \u201cJewish King of Infidelity.\u201d<\/p>\n<p>On July 10, a mocking montage of Biderman photos with racist captions was posted to the extremist website\u00a0<a href=\"https:\/\/www.splcenter.org\/hatewatch\/2014\/04\/14\/vanguard-news-network-track-record-violence\" target=\"_blank\" rel=\"noopener\">Vanguard News Network<\/a>, as part of a thread called \u201cJews normalize sexual perversion.\u201d<\/p>\n<p>Some readers have suggested that the data leaked by the Impact Team could have originally been stolen by Harrison. But that timeline does not add up given what we know about the hack. For one thing, the financial transaction records leaked from Ashley Madison show charges up until mid-2015. Also, the final message in the archive of Biderman\u2019s stolen emails was dated July 7, 2015 \u2014 almost two weeks before the Impact Team would announce their hack.<\/p>\n<p>Whoever hacked Ashley Madison clearly wanted to disrupt the company as a business, and disgrace its CEO as the endgame. The Impact Team&#8217;s intrusion struck just as Ashley Madison&#8217;s parent was preparing go public with an initial public offering (IPO) for investors. Also, the hackers stated that while they stole all emplyee emails, they were only interested in leaking Biderman&#8217;s.<\/p>\n<p>Also, the Impact Team had to know that ALM would never comply with their demands to dismantle Ashley Madison and Established Men. In 2014, ALM reported revenues of $115 million. There was little chance the company was going to shut down some of its biggest money machines.<\/p>\n<p>Hence, it appears the Impact Team\u2019s goal all along was to create prodigious amounts of drama and tension by announcing the hack of a major cheating website, and then let that drama play out over the next few months as millions of exposed Ashley Madison users freaked out and <a href=\"https:\/\/krebsonsecurity.com\/2015\/08\/extortionists-target-ashley-madison-users\/\" target=\"_blank\" rel=\"noopener\">became the targets of extortion attacks and public shaming<\/a>.<\/p>\n<p>After the Impact Team released Biderman&#8217;s email archives, several media outlets pounced on salacious exchanges in those messages as supposed proof he had carried on multiple affairs. Biderman resigned as CEO of Ashley Madison on Aug. 28, 2015.<\/p>\n<p>Complicating things further, it appears more than one malicious party may have gained access to Ashley&#8217;s Madison&#8217;s network in 2015 or possibly earlier. Cyber intelligence firm <a href=\"https:\/\/www.intel471.com\/\" target=\"_blank\" rel=\"noopener\">Intel 471<\/a>\u00a0recorded a series of posts by a user with the handle \u201c<strong>Brutium<\/strong>\u201d on the Russian-language cybercrime forum\u00a0<strong>Antichat<\/strong>\u00a0between 2014 and 2016.<\/p>\n<p>Brutium routinely advertised the sale of large, hacked databases, and on Jan. 24, 2015, this user posted a thread offering to sell data on 32 million Ashley Madison users. However, there is no indication whether anyone purchased the information. Brutium\u2019s profile has since been removed from the Antichat forum.<\/p>\n<p>I realize this ending may be unsatisfying for many readers, as it is for me. The story I wrote in 2015 about the Ashley Madison hack is still the biggest scoop I&#8217;ve published here (in terms of traffic), yet it remains perhaps the single most frustrating investigation I&#8217;ve ever pursued. But my hunch is that there is still more to this story that has yet to unfold.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2023\/07\/seo-expert-hired-and-fired-by-ashley-madison-turned-on-company-promising-revenge\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2015\/07\/impactteam-580x657.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Thu, 13 Jul 2023 21:45:02 +0000<\/strong><\/p>\n<p>[This is Part II of a story published here last week on reporting that went into a new Hulu documentary series on the 2015 Ashley Madison hack.]    It was around 9 p.m. on Sunday, July 19, when I received a message through the contact form on KrebsOnSecurity.com that the marital infidelity website AshleyMadison.com had been hacked. The message contained links to confidential Ashley Madison documents, and included a manifesto that said a hacker group calling itself the Impact Team was prepared to leak data on all 37 million users unless Ashley Madison and a sister property voluntarily closed down within 30 days.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16740,19109,11740,14851,27099,16696,29753],"class_list":["post-22471","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-a-little-sunshine","tag-ashley-madison-hack","tag-data-breaches","tag-hulu","tag-impact-team","tag-neer-do-well-news","tag-william-webster-harrison"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22471"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22471\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22471"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}