August 25, 2015 By Douglas Bonderud 2 min read

Nothing is safe on the Internet. Users of extramarital meetup site Ashley Madison learned this the hard way in July when the website was compromised by a hacktivist group known as the Impact Team. The cybercriminals claimed their security breach is in the public’s best interest, while critics argued that exposing highly personal details about users does much more harm than good.

Moral implications aside, this is an affair to remember for any company because it offers two key takeaways: No organization is immune from security threats, and hacktivists aren’t particularly choosy about their targets.

Site Unseen

According to Trend Micro, the Impact Team started by breaching Ashley Madison’s database and then demanded that both the original site and another affiliated site be taken down permanently. At first, the group only released bits and pieces of information — a customer record here, a corporate email there — to prove it was telling the truth.

When executives refused to cooperate, however, the cybercriminals aired the dirty laundry of users worldwide. Company secrets were also revealed: As noted by Gizmodo, Ashley Madison’s CTO allegedly hacked the database of a competing website, gained complete access and stole consumer data.

From a technical perspective, however, the Ashley Madison attacks are interesting for two reasons. First is the discovery that, to some extent, the site was actually taking steps to effectively protect users. Although they didn’t live up to the promise of paid data deletion, user passwords were encrypted when stored rather than simply saved as plaintext. Secondly, the hack revealed a number of members using either .mil or .gov email addresses, while others used corporate emails for intersite communications.

There’s enough blame to go around, but what’s interesting here is that Ashley Madison actually took some effort to mitigate the impact of a data breach; users supplying detailed and often intimate information, meanwhile, did not.

Both sides are served by the same cybersecurity effort, however: preparation. For example, the site could have asked for fewer details up front and done a better job of encrypting all stored information. Restricting data access is also a possibility, especially since there is some speculation that the hack was an inside job. Providing narrow access can help reduce the number of potentially compromised endpoints.

Here, There, Everywhere

Companies must also prepare for the fact that no industry or vertical is safe from hacktivists. Originally a term used to describe hacker groups that had a sense of social justice as their core purpose, many such groups have devolved into little more than cyber bully organizations who humiliate or punish users in an attempt to break corporate spirits.

According to the Epoch Times, for example, the Canadian government was recently targeted by hacktivist group Anonymous after a protester wearing the organization’s uniform — a Guy Fawkes mask — was shot by police. The group threatened to expose government documents unless the officer responsible was named and arrested. In effect, any group that runs afoul of Internet mob justice or clashes with hacktivist supporters can find themselves next on the security breach hit list.

So what’s the bottom line? Hacks are inevitable and largely random. This sounds like bad news but actually presents a compelling reason for organizations to take steps toward mitigation. Total defense isn’t possible, but with a combination of encryption, access control and small-scale data collection, companies can reduce the possibility of private affairs becoming public news.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

3 min read - Rhode Island is grappling with the fallout of a significant ransomware attack that has compromised the personal information of hundreds of thousands of residents enrolled in the state’s health and social services programs. Officials confirmed the attack on the RIBridges system—the state’s central platform for benefits like Medicaid and SNAP—after hackers infiltrated the system on December 5, planting malicious software and threatening to release sensitive data unless a ransom is paid. Governor Dan McKee, addressing the media, called the attack…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today