August 25, 2015 By Douglas Bonderud 2 min read

Nothing is safe on the Internet. Users of extramarital meetup site Ashley Madison learned this the hard way in July when the website was compromised by a hacktivist group known as the Impact Team. The cybercriminals claimed their security breach is in the public’s best interest, while critics argued that exposing highly personal details about users does much more harm than good.

Moral implications aside, this is an affair to remember for any company because it offers two key takeaways: No organization is immune from security threats, and hacktivists aren’t particularly choosy about their targets.

Site Unseen

According to Trend Micro, the Impact Team started by breaching Ashley Madison’s database and then demanded that both the original site and another affiliated site be taken down permanently. At first, the group only released bits and pieces of information — a customer record here, a corporate email there — to prove it was telling the truth.

When executives refused to cooperate, however, the cybercriminals aired the dirty laundry of users worldwide. Company secrets were also revealed: As noted by Gizmodo, Ashley Madison’s CTO allegedly hacked the database of a competing website, gained complete access and stole consumer data.

From a technical perspective, however, the Ashley Madison attacks are interesting for two reasons. First is the discovery that, to some extent, the site was actually taking steps to effectively protect users. Although they didn’t live up to the promise of paid data deletion, user passwords were encrypted when stored rather than simply saved as plaintext. Secondly, the hack revealed a number of members using either .mil or .gov email addresses, while others used corporate emails for intersite communications.

There’s enough blame to go around, but what’s interesting here is that Ashley Madison actually took some effort to mitigate the impact of a data breach; users supplying detailed and often intimate information, meanwhile, did not.

Both sides are served by the same cybersecurity effort, however: preparation. For example, the site could have asked for fewer details up front and done a better job of encrypting all stored information. Restricting data access is also a possibility, especially since there is some speculation that the hack was an inside job. Providing narrow access can help reduce the number of potentially compromised endpoints.

Here, There, Everywhere

Companies must also prepare for the fact that no industry or vertical is safe from hacktivists. Originally a term used to describe hacker groups that had a sense of social justice as their core purpose, many such groups have devolved into little more than cyber bully organizations who humiliate or punish users in an attempt to break corporate spirits.

According to the Epoch Times, for example, the Canadian government was recently targeted by hacktivist group Anonymous after a protester wearing the organization’s uniform — a Guy Fawkes mask — was shot by police. The group threatened to expose government documents unless the officer responsible was named and arrested. In effect, any group that runs afoul of Internet mob justice or clashes with hacktivist supporters can find themselves next on the security breach hit list.

So what’s the bottom line? Hacks are inevitable and largely random. This sounds like bad news but actually presents a compelling reason for organizations to take steps toward mitigation. Total defense isn’t possible, but with a combination of encryption, access control and small-scale data collection, companies can reduce the possibility of private affairs becoming public news.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today