«

»

Aug 25 2015

Print this Post

Hackers Now Going After Ashley Madison Targets

EDITORIAL: Alexandra Mayers from PublicFiguresToday.com just talked recently about the Los Angeles porn industry’s plan to do exactly what they’re talking about below. When you’re doing something you shouldn’t be doing, you leave yourself open to be exploited.

These sites are owned by organized crime pimps. Canadian organized crime pimps. They are really online prostitution marketing catalogs. Want a girl, rent one here. Take your pick. There’s a type for everyone. What they don’t tell you is they own these sites, they hack these sites and then they extort the users. It’s no different than the porn copyright trolls posting porn and then extorting their users for downloading it! 

Donny Long is suspected of hacking the porn industry’s old testing center, AIM, stealing 15,000 names and personal information of pornstars, anyone who had tested for the industry during the clinic’s existence. This hacking was the basis of our lawsuit against AIM testing clinic. They went bankrupt and the federal bankruptcy court trustee destroyed their records, evidence we were seeking in an active lawsuit. Corruption everywhere!

If you climb in bed with the devil, you will get burned. Wondering how long it’s gonna take for men to figure that one out!

Donny Long & Pornwikileaks makes plans to extort everyone listed in the Ashley Madison data dump via their “removal service”!

white-hat-seo-vs-black-hat-seo
Hackers have taken to the 36 million email list stolen during the Ashley Madison hack to attempt to extort folks who may or may not have used the app to cheat. Brian Krebs has spoken to an admin in Milwaukee named Rick Romero who has been actively blocking outdoing emails asking hacked users to send a single bitcoin to keep their accounts private.

Hello,Unfortunately, your data was leaked in the recent hacking of Ashley Madison and I now have your information.

If you would like to prevent me from finding and sharing this information with your significant other send exactly 1.0000001 Bitcoins (approx. value $225 USD) to the following address:

1B8eH7HR87vbVbMzX4gk9nYyus3KnXs4Ez [link added]

Sending the wrong amount means I won’t know it’s you who paid.

You have 7 days from receipt of this email to send the BTC [bitcoins]. If you need help locating a place to purchase BTC, you can start here…..

One user, Mac, told Krebs that the extortion would be very disruptive but he isn’t worried. “So they have my home billing address and first and last name, so it would be relatively easy for them to get my home records and figure out who I am,” he said. “I’ll accept the consequences if this does get disclosed, but obviously I’d rather not have that happen because my wife and I are both very happy in our marriage.”

Furthermore, it’s slowly becoming clearer just how the company was running its own hacking attempts against the competition. For example in 2012, the founding CTO Raja Bhatia wrote that competitor Nerve.com was full of holes.


“They did a very lousy job building their platform. I got their entire user base,” Bhatia told Biderman via email, including in the message a link to a Github archive with a sample of the database. “Also, I can turn any non paying user into a paying user, vice versa, compose messages between users, check unread stats, etc.”

The leak, to say the least, is reaping some interesting – and potentially problematic – bounties for white hat and black hat hackers.

Permanent link to this article: http://porninthevalley.com/2015/08/25/hackers-now-going-after-ashley-madison-targets/

Leave a Reply