Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

John McAfee: Ashley Madison Database Stolen by Lone Female Who Worked for Avid Life Media
International Business Times ^ | August 24, 2015 | John McAfee

Posted on 08/24/2015 1:34:58 PM PDT by nickcarraway

Yes, it is true. Ashley Madison was not hacked - the data was stolen by a woman operating on her own who worked for Avid Life Media. The reason that I am so late to the second act of the Ashley Madison affair is that, without a supercomputer, it has taken over a week to finish the analysis of the massive data dumps that the perpetrator has so generously provided us with.

A hacker is someone who uses a combination of high-tech cybertools and social engineering to gain illicit access to someone else's data. But this job was done by someone who already had the keys to the Kingdom. It was an inside job.

In my first IBTimes UK article about Act One of the Ashley Madison Affair, I alleged that the group of hackers claiming responsibility for the "hack" simply did not exist. I gleaned this information from reliable sources within the Dark Web – which have yet to fail me. I also claimed that it was the act of a single person.

Any adept social engineer would have easily seen this from the wording in the first manifesto published by the alleged hacking group. I was one of the first practitioners of social engineering as a hacking technique and today it is my only tool of use, aside from a smartphone – in a purely white hat sort of way. But if you don't trust me, then ask any reasonably competent social engineer.

Lone female operative

Today, I can confidently claim that the single person is a woman, and has recently worked within Avid Life Media. I have provided IBTimes UK background information and pertinent elements of the woman's data dump to prove both my access to the data and also to confirm elements of my research, under the strict conditions that it is to be referenced and then destroyed. The data I provided included such delicate material as the decoded password hash tables of every Avid Life and Ashley Madison employee, which I have also now destroyed.

How did I come to this conclusion? Very simply. I have spent my entire career in the analysis of cybersecurity breaches, and can recognise an inside job 100% of the time if given sufficient data - and 40GB is more than sufficient. I have also practiced social engineering since the word was first invented and I can very quickly identify gender if given enough emotionally charged words from an individual. The perpetrator's two manifestos provided that. In short, here is how I went about it.

How did I discover that it was an inside job? From the data that was released, it was clear that the perpetrator had intimate knowledge of the technology stack of the company (all the programs being used). For example, the data contains actual MySQL database dumps. This is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target.

Strange files

More important, large companies are heavily departmentalised, in spite of having centralised databases. When a hacker gains access to any corporate data, the value of that data depends on which server, or sometimes a single person's computer, that the hacker gains access to. For example: the personnel work scheduling for equipment maintenance will normally exist only on the workstation of the maintenance manager.

Likewise, the data for options for stock shares in a company, an extremely private set of data, will exist only in a private file on the workstation of the VP of Finance, or the CEO, or possibly both. It would require an equal amount of work to gain access to the personnel schedule for maintenance as it would to acquire a list of potential corporate owners. Hackers don't have all the time in the world, so they pick and choose wisely. Among the data that the perpetrator released is the following:

An office layout for the entire Ashley Madison offices. This would normally exist only in the office of personnel management, the maintenance department, and possibly a few other places. It would certainly not be in the centralised database. Neither would it be of much value to the average hacker.

Up to the minute organisation charts for every Avid Life division. This might be of value to certain hackers, but considering the hacker had already made off with everyone's credit card info, billions of dollars worth of blackmail information, every private email of the CEO (fascinating, by the way), and everything else of value, it would seem odd to dig up the organisation charts as well.

A stock option agreement list, with signed contracts included. The hacker would have had to gain access to the private files of the CEO or the VP of Finance to obtain this material – a job requiring as much time to implement as a hack of the centralised database. Again, of what value would this be considering the hacker had already made off with potentially billions.

IP addresses and current status of every server owned by Avid Life – of which there were many hundreds scattered around the world. Why any hacker would trouble themselves with such a task, considering what was already taken, is mind boggling.

The raw source code for every program Ashley Madison ever wrote. This acquisition would be a monumental task for any hacker and, unless the hacker planned on competing with Ashley Madison, has no value whatsoever. These are just a few of the many strangely included files that would take even a top notch hacker years to gather, and seem to have little or no value. Any reasonable cybersecurity expert would come to the conclusion that only someone on the inside, who could easily gain all of the files through deception and guile, could have done the job.

If we include the fact that the perpetrator's two manifestos clearly state a strong personal dislike of the VP of Information Technology (whom the perpetrator referenced as having made specific comments in the past) and the CEO, and specifically names employees that are liked and are doing a good job, then it seems, without a shadow of doubt, to be an open and shut case.

As to gender of the perpetrator, there were a number of telling signs in the manifestos. The most telling was a statement calling men "scumbags" (for those readers that don't speak American/Canadian English, this is a word that only a woman would ever use to describe men). In a separate section, the perpetrator describes men as cheating dirtbags. I think in any language this would suggest that a woman is speaking.

If that fails to convince you, then this must: In the first manifesto two names of male members were released. In describing one of them the perpetrator states the he "spitefully" joined Ashley Madison the day after Valentine's Day. Anyone who ever had a significant other knows that women rate Valentine's Day higher than Christmas, and men think so little of it that they have to remind each other the day is nearing. To call an act the day after Valentines Day "spiteful", is a thought that would enter few men's minds. If this does not convince you then you need to get out of the house more often.

I must, at this point, thank my lead data analyst, Jacque Donahue, for working 24-hours-a-day for the past few days helping analyse more than 40GB of data.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: ashleymadison
Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 next last
To: nickcarraway
..."scumbags" (for those readers that don't speak American/Canadian English, this is a word that only a woman would ever use to describe men).

Wrong. I've used it and heard it used frequently by other men to describe...scumbags!

21 posted on 08/24/2015 2:14:50 PM PDT by JimRed (Excise the cancer before it kills us; feed & water the Tree of Liberty! TERM LIMITS NOW & FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: mad_as_he$$

Can you explain what this has to do with Trump?


22 posted on 08/24/2015 2:16:55 PM PDT by nickcarraway
[ Post Reply | Private Reply | To 20 | View Replies]

To: mad_as_he$$

Are you claiming Melania has an account?


23 posted on 08/24/2015 2:17:15 PM PDT by nickcarraway
[ Post Reply | Private Reply | To 20 | View Replies]

To: nickcarraway
..."scumbags" (for those readers that don't speak American/Canadian English, this is a word that only a woman would ever use to describe men).

Wrong. I've used it and heard it used frequently by other men to describe...scumbags!

24 posted on 08/24/2015 2:17:17 PM PDT by JimRed (Excise the cancer before it kills us; feed & water the Tree of Liberty! TERM LIMITS NOW & FOREVER!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: American Quilter

Poetic justice brought to a boil. She crushes the fantasies of millions of cheaters in one paroxysmic gasp.


25 posted on 08/24/2015 2:19:20 PM PDT by Louis Foxwell (This is a wake up call. Join the Sultan Knish ping list.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: nickcarraway

If her identity is ever revealed, she is likely to be a dead woman.


26 posted on 08/24/2015 2:19:31 PM PDT by PapaBear3625 (You don't notice it's a police state until the police come for you.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

One reaps what ones sows.


27 posted on 08/24/2015 2:22:34 PM PDT by RginTN
[ Post Reply | Private Reply | To 1 | View Replies]

To: Black Agnes

He is basing much of his conclusion on the immense expenditure of time and resources needed to gather all of the information dumped. If it were hacked rather than simply stolen and disseminated from the inside.
As to the sex of the dumper, only a woman would seek to destroy the fantasies of a million men.


28 posted on 08/24/2015 2:23:28 PM PDT by Louis Foxwell (This is a wake up call. Join the Sultan Knish ping list.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: mad_as_he$$

“So Trump isn’t guilty on this one?”

No - Bushes fault.


29 posted on 08/24/2015 2:33:45 PM PDT by ForYourChildren (Christian Education [ RomanRoadsMedia.com - Classical Christian Approach to Homeschool ])
[ Post Reply | Private Reply | To 20 | View Replies]

To: Louis Foxwell

Or an idealistic techie who worked there, offended that the $19 being paid to delete information was just a huge scam.

Don’t automatically attribute the time/energy to a female involved. Most IT techs are aspies. Idealism and unrealistic views about interpersonal relationships are hallmarks of aspieness. Once they make up their minds about something...Could be found dad in the database. Or ‘the wife’.

Basing my supposition on the anger over $19 fees for anonymity being a scam as the modus operandi.

Firm I worked for about 20 years ago had a hack (inside hack) from someone interested in using the US web to look at porn. Used a very very circuitous way to get around internal safeguards. Took them weeks to set it up. To look at porn. That, in the European country from whence they hailed, was available over the television waves. And bypassed totally all the trading floors and ‘banking’ servers that had actual money on them to look at ‘nekkid women’. This was before streaming video was feasible btw, he was using the hackaround to look at still shots. And in his country there were public nude beaches and comely females there weren’t in short supply.

My assessment is based on the paucity of females with tech skills necessary, by and large.


30 posted on 08/24/2015 2:40:03 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 28 | View Replies]

To: UCANSEE2
As far as I can tell, most all of the ‘hacks’ recently have been ‘insider’ jobs.

Right. And it's insane because it's not hard to set up encryption schemes so that no single person, or two or three or whatever has the entire key.

Any organization that depends on confidentiality and does not employ these options deserves to be robbed. And will be.


31 posted on 08/24/2015 2:43:48 PM PDT by 867V309 (Trump: Bull in a RINO Shoppe)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Nep Nep

Could also be a homosexual male.


32 posted on 08/24/2015 2:49:22 PM PDT by Secret Agent Man (Gone Galt; Not averse to Going Bronson.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: nickcarraway

The best part isn’t the details of Who Did What, it’s all the excuses they are making up after getting caught.


33 posted on 08/24/2015 2:51:18 PM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
McAfee's positing a bunch of psychology about the files that were taken, and why.

To anyone else, it looks like the servers were simply cloned and posted online, in toto. It doesn't seem at all like files were chosen as more, or less, embarrassing. Everything needed to embarrass and destroy the company was copied and released.

You don't need a PhD to come up with conspiracy theories**.

**McAfee's a piece of work...

34 posted on 08/24/2015 3:03:57 PM PDT by IncPen (Not one single patriot in Washington, DC.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

John McAfee has gone off the deep end...


35 posted on 08/24/2015 3:09:33 PM PDT by Toliph
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

Josh Duggar wants the phone number and pic of the woman who stole all that data.


36 posted on 08/24/2015 3:32:54 PM PDT by PJ-Comix (DUmmie Skinner: Bought & Paid For By Hillary)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

The clone scenario is a good one.

After all, it’s work to reverse engineer AM’s schema.

Just clone, post, and let others figure it out.

I work with women all the time, usually Indian, who are DBA’s and have back end access, remotely, of very sensitive information.

It’s so easy.

Then there’s the culture. In conversations, I casually remark to Indian women on how Indian marriages are solid and respected for life.

The response: not any longer, not in the US.

So this too is an enabler.


37 posted on 08/24/2015 3:51:32 PM PDT by cicero2k
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
Perp at work. ;)


38 posted on 08/24/2015 4:01:55 PM PDT by anymouse (God didn't write this sitcom we call life, he's just the critic.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ForYourChildren

+1. Yup.


39 posted on 08/24/2015 4:04:04 PM PDT by mad_as_he$$ (Section 20.)
[ Post Reply | Private Reply | To 29 | View Replies]

To: nickcarraway

From a man who killed his neighbor and made his own “bath salts” to get high on.


40 posted on 08/24/2015 4:31:24 PM PDT by KosmicKitty (Liberals claim to want to hear other views, but then are shocked to discover there are other views)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson