How Ashley Madison Data Breach Ended Marriages

  • By David Lukic
  • Published: Sep 15, 2020
  • Last Updated: Nov 23, 2023

Ashley Madison is a website that encourages extramarital affairs. They promise discretion and absolute privacy for people already in a relationship who want more. However, all those empty promises lay on the floor with the massive 2015 Ashley Madison data breach.

Due to the highly sensitive nature of the website and its purpose, there were some fairly catastrophic consequences to Ashley Madison Hack. At least two suicides are linked to the Ashley Madison leaks along with hundreds of divorces and breakups. A hacker group called Impact Team instituted the data breach. At the time of the breach, there were approximately 32 million members. As of now, the website signs up 20,000 new members per month. The Ashley Madison hack has apparently not slowed down business for the unique relationship site. Even the CEO of Ashley Madison, Noel Biderman, was affected. He was a member of the site, and after exposure of his information, he resigned. 

Ashley Madison Data Breach

When and How Was Ashley Madison Hacked

Impact team hacking was responsible for the Ashley Madison breach on July 12, 2015. The employees of Avid Life Media (the parent company for Ashley Madison) logged into the system to find the AC/DC song “Thunderstruck” playing with a threat to shut down the site along with its sister site Established Men or they would release company and customer data. They gave them 30 days to shut things down. Instead, Ashley Madison alerted the authorities and processed an internal investigation. In August of 2015, the hacker group responsible for Ashley Madison leaked all 32 million users’ data, including government, military, and corporate user’s email addresses, IP addresses, home addresses, credit card records, and even deleted users’ accounts.

How to Check if You're a Victim of Ashley Madison Leak

If you were a member of Ashley Madison before July of 2015, you were included in the breach. At the time, they did alert members and suggested changing your password. Shockingly more than 120,000 users were using “123456” as their password. It did not take long for the hacker group to crack all 30 million. You can contact Ashley Madison directly if you have questions or concerns about your account after the ashley madison data breach. 

ashley madison data breach

Targeted by Ashley Madison Hack Scandal? Here's What to Do

If your targeted Ashley Madison data breach, you should take a few precautions. First, reset your password on the website using a really strong combination of letters, symbols, and numbers. Additionally, you should also:

  • Cancel the credit card used on the site and get a new one.

  • Consider a credit freeze to prohibit anyone from opening accounts in your name. 

  • Sign up for credit monitoring immediately with a company like IDStrong.com.

  • If you used the same password anywhere else, change it there too.

  • Run a deep scan of your computer to check for malware and viruses.

  • Watch out for phishing scams and threats via email.

ashley madison leak

The Lawsuit Settlement of Ashley Madison

In Canada, there was a class-action lawsuit for $578 million to cover all Canadian victims. Ashley Madison did refund account deletion fees to the thousands of users who paid the fee, but their account remained in the system.

Can Ashley Madison leaked Information be Used for Identity Theft?

Yes. In fact, millions of users reported receiving blackmail threats via email. The sensitive nature of this type of website yields itself to a higher risk of danger and identity theft. You cannot be too careful about protecting yourself against identity theft

How To Protect Yourself Against Breaches Like Kentucky Ashley Madison Leak

It is more important than ever to protect your online information. When signing up with any website, you never can be sure how well your details will be protected. However, there are things you can do to stay safe:

  • Only use a single credit card online and review the monthly statements diligently for fraud or misuse.

  • Change your online passwords frequently and use hard-to-guess combinations of letters, symbols, and numbers. 

  • Consider using a password vault to keep all your strong passwords in one place.

  • Keep your computers and other devices updated with security patches and antivirus software. Run deep scans often.

  • Use common sense with email; never click a link or download an attachment from an email and watch out for spam and phishing scams.

About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close