News of the Ashley Madison breach broke July 19, and dates in the files leaked Tuesday suggest they were stolen during the three weeks prior.The attackers, for example, appear to have run some of the commands that extracted data from ALM servers on July 1.The release of source code is also problematic for another reason—it exposes the company's intellectual property to anyone who wants to design a similar business.
It appears to contain an email spool for Avid Life Media CEO Noel Bidman.
A version of email file hackers distributed Thursday turned out to be corrupted and couldn't be opened, but they reposted a new version today, which is still being downloaded by journalists.
Eriksson wouldn't say how the hackers got in, due to the ongoing investigation, but he noted "there is no indication of any software vulnerability being exploited during this incident."The hackers from Impact Team told Motherboard, "We worked hard to make fully undetectable attack, then got in and found nothing to bypass…. It was definitely a person here that was not an employee but certainly had touched our technical services."Eriksson wouldn't go into detail, but told WIRED that even though there is no evidence that the attackers used a software vulnerability to get in, "all ALM source code is being audited for vulnerabilities and backdoors." He added that "all aspects of their network and server environment are now being thoroughly reviewed in order to determine how they may be hardened further, and the amount and granularity of monitoring is being increased in order to detect and handle any anomaly as soon as possible."With the site's source code and network blueprints already released by the hackers, however, the company is now in a race to find and close vulnerabilities before other attackers can find and exploit them.
In the initial manifesto the attackers published last month, and in the interview with Motherboard, they said they had been in Avid Life Media's servers for years."We have hacked them completely, taking over their entire office and production domains and thousands of systems, and over the past few years have taken all customer information databases, complete source code repositories, financial records, documentation, and emails, as we prove here," they wrote. For a company whose main promise is secrecy, it's like you didn't even try, like you thought you had never pissed anyone off."Eriksson wouldn't tell WIRED exactly when the hackers struck, but timestamps around the released files suggest a lot of the data theft occurred recently, rather than over a number of years—if the timestamps are reliable.
Por favor presiona el “interruptor” para habilitar Flash en tu navegador.