
Getting in on the act: moral crusaders, operating with impunity, began to shame and squeeze the exposed. He tried to work out ways in which he would be exposed if the hackers went through with their threat to release Ashley Madison’s customer database. So Michael was “irritated and surprised” to realise, that Monday morning, that his elaborate precautions had been pointless. Michael had six internet browsers installed on the laptop, and one of these browsers could only be loaded via external hard drive – this was the browser he used to arrange affairs. If he wanted to log on to Ashley Madison to speak to women he would only do so on a work laptop he kept in his office at home.

Whenever he visited the site he was careful. But the picture he chose was small and he was wearing sunglasses in it. He was experienced enough with adultery websites – Ashley Madison and a British equivalent called Illicit Encounters – to know that “if you don’t put a photo up you won’t get many responses”. “I’d taken some elementary precautions,” Michael told me recently, explaining that he’d registered on Ashley Madison with a secret email address and chosen a username by which he couldn’t be personally identified. Though in the days to come the number of active users of Ashley Madison’s service would be disputed – was that figure of 37.6 million for real? – Michael could say for sure there were many authentic adulterers who used the site because he was one of them. More than 30 million people in more than 40 countries affected.
ASHLEY MADISON SUCCESS STORY FULL
Infidelity site hacked, he read a group calling itself the Impact Team claiming responsibility and threatening to release a full database of Ashley Madison customers, present and past, inside a month. The story was a lead item on every news page Michael browsed. Already Krebs’s story about a hack of servers at Ashley Madison had been picked up by prominent media agencies. Only a few hours later, in the west of England, a contentedly married man we’ll call Michael woke up and went through his usual Monday-morning routine. Then the CEO of Ashley Madison began the slow, careful work of begging Krebs not to publish anything about the most appallingly intimate internet leak of the modern age. Have an affair’: former Ashley Madison CEO Noel Biderman. He even found the personal mobile number of the CEO, a Canadian called Noel Biderman. Among documents in the leaked cache, Krebs found a list of telephone numbers for senior executives at ALM and Ashley Madison. He was looking at street addresses and postcodes. Only now Krebs was looking at the real names and the real credit-card numbers of Ashley Madison members. Have an affair” was the slogan Ashley Madison used.Īt the time Krebs received his tip-off, Ashley Madison claimed to have an international membership of 37.6 million, all of them assured that their use of this service would be “anonymous”, “100% discreet”. For years it had run a notorious, widely publicised web service called Ashley Madison, a dating site founded in 2008 with the explicit intention of helping married people have affairs with each other. An anonymous informant had emailed him a list of links, directing him to caches of data that had been stolen from servers at a Canadian firm called Avid Life Media (ALM). Now Krebs, as his weekend came to an end, was being tipped off about a more sensational breach. For years Krebs had written a popular blog about internet security, analysing thefts of consumer data from big companies around the world, Tesco, Adobe, Domino’s Pizza among them. The 42-year-old was at home in Virginia at the time, and wearing pyjamas.

I t was 9 o’clock on a Sunday night last July when a journalist called Brian Krebs came upon the scoop of his life.
