How Ashley Madison Data Breach Ended Marriages

  • By David Lukic
  • Sep 15, 2020

Ashley Madison is a website that encourages extramarital affairs. They promise discretion and absolute privacy for people already in a relationship who want more. However, all those empty promises lay on the floor with the massive 2015 Ashley Madison data breach.

Due to the highly sensitive nature of the website and its purpose, there were some fairly catastrophic consequences to Ashley Madison Hack. At least two suicides are linked to the Ashley Madison leaks along with hundreds of divorces and breakups. A hacker group called Impact Team instituted the data breach. At the time of the breach, there were approximately 32 million members. As of now, the website signs up 20,000 new members per month. The Ashley Madison hack has apparently not slowed down business for the unique relationship site. Even the CEO of Ashley Madison, Noel Biderman, was affected. He was a member of the site, and after exposure of his information, he resigned. 

Ashley Madison Data Breach

When and How Was Ashley Madison Hacked

Impact team hacking was responsible for the Ashley Madison breach on July 12, 2015. The employees of Avid Life Media (the parent company for Ashley Madison) logged into the system to find the AC/DC song “Thunderstruck” playing with a threat to shut down the site along with its sister site Established Men or they would release company and customer data. They gave them 30 days to shut things down. Instead, Ashley Madison alerted the authorities and processed an internal investigation. In August of 2015, the hacker group responsible for Ashley Madison leaked all 32 million users’ data, including government, military, and corporate user’s email addresses, IP addresses, home addresses, credit card records, and even deleted users’ accounts.

How to Check if Your Victim of Ashley Madison Data Breach

If you were a member of Ashley Madison before July of 2015, you were included in the breach. At the time, they did alert members and suggested changing your password. Shockingly more than 120,000 users were using “123456” as their password. It did not take long for the hacker group to crack all 30 million. You can contact Ashley Madison directly if you have questions or concerns about your account. 

Ashley Madison scandal

Targeted by Ashley Madison Scandal? Here's What to Do

If your targeted Ashley Madison data breach, you should take a few precautions. First, reset your password on the website using a really strong combination of letters, symbols, and numbers. Additionally, you should also:

  • Cancel the credit card used on the site and get a new one.

  • Consider a credit freeze to prohibit anyone from opening accounts in your name. 

  • Sign up for credit monitoring immediately with a company like

  • If you used the same password anywhere else, change it there too.

  • Run a deep scan of your computer to check for malware and viruses.

  • Watch out for phishing scams and threats via email.

how was Ashley Madison hacked

The Lawsuit Settlement of Ashley Madison

In Canada, there was a class-action lawsuit for $578 million to cover all Canadian victims. Ashley Madison did refund account deletion fees to the thousands of users who paid the fee, but their account remained in the system.

Can Ashley Madison leaked Information be Used for Identity Theft?

Yes. In fact, millions of users reported receiving blackmail threats via email. The sensitive nature of this type of website yields itself to a higher risk of danger and identity theft. You cannot be too careful about protecting yourself against identity theft

How To Protect Yourself Against Data Breaches  

It is more important than ever to protect your online information. When signing up with any website, you never can be sure how well your details will be protected. However, there are things you can do to stay safe:

  • Only use a single credit card online and review the monthly statements diligently for fraud or misuse.

  • Change your online passwords frequently and use hard-to-guess combinations of letters, symbols, and numbers. 

  • Consider using a password vault to keep all your strong passwords in one place.

  • Keep your computers and other devices updated with security patches and antivirus software. Run deep scans often.

  • Use common sense with email; never click a link or download an attachment from an email and watch out for spam and phishing scams.

About the Author
IDStrong Logo

Related Articles

The Anatomy Of Amazon Data Breach Explained

Along with being an online merchant, Amazon also supplies cloud servers to some heavy hitters in t ... Read More

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach

T-Mobile Data Breach incident occurred many times. Once from September 1, 2013, and September 16, ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. Wha ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

Latest Articles

Regal Medical Group Data Breach Affects Patients of At Least Four Healthcare Providers

Regal Medical Group Data Breach Affects Patients of At Least Four Healthcare Providers

It's been less than a week since February 2023 started, yet we are, reading about a new medical breach. Over 90% of hospitals have admitted to being victims of data breaches.

Weekly Cybersecurity Recap February 3

Weekly Cybersecurity Recap February 3

Well, the last month has passed incredibly quickly and without much stir, which gives us hope for the next year. However, this month has been incredibly eventful in the world of cybersecurity.

Bell-Carter Foods Announced A Data Breach

Bell-Carter Foods Announced A Data Breach

Any large-scale company is at heightened risk of becoming the victim of a data breach. It doesn't always seem like the most obvious target; whether it's a power company, a grocer, or a chain restaurant, there is actually a lot of desirable information available from these companies' databases.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an email address