Hack password dating site
One company started offering a "search engine" where people could type email addresses of colleagues or their spouse into the website, and if the email address was on the database leak, then the company would send them letters threatening that their details were to be exposed unless they paid money to the company.
In a subsequent article the following week Newitz acknowledged that she had "misunderstood the evidence" in her previous article, and that her conclusion that there were few females active on the site had actually been based on data recording "bot" activities in contacting members.
She notes that "we have absolutely no data recording human activity at all in the Ashley Madison database dump from Impact Team.
All we can see is when fake humans contacted real ones." A security analyst using the Hashcat password recovery tool with a dictionary based on the Rock You passwords found that among the 4,000 passwords that were the easiest to crack, "123456" and "password" were the most commonly used passwords on the live website.
On 18th and 20th of August, the group leaked more than 25 gigabytes of company data, including user details.
Because of the site's policy of not deleting users' personal information – including real names, home addresses, search history and credit card transaction records – many users feared being publicly shamed.The Impact Team announced the attack on 15 July 2015 and threatened to expose the identities of Ashley Madison's users if its parent company, Avid Life Media, did not shut down Ashley Madison and its sister site, "Established Men".