Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

steve2470

(37,457 posts)
Sat Aug 22, 2015, 12:32 PM Aug 2015

Ashley Madison hackers leave footprints that may help investigators

http://arstechnica.com/security/2015/08/ashley-madison-hackers-leave-footprints-that-may-help-investigators/

The people who leaked more than 200,000 e-mails from the Ashley Madison dating service for cheaters left behind footprints that will almost certainly be of interest to police and company officials.

The BitTorrent file containing e-mail for Noel Biderman, the CEO of Ashley Madison parent company Avid Life Media, was originally uploaded by someone using a server operated by Ecatel Ltd., a web host headquartered in the Netherlands. A Web interface for administering the BitTorrent server was left exposed to the Internet without a password, making it possible for outsiders to access. A few hours after the BitTorrent went live, the server went dark after an outsider accessed the wide-open interface and began making changes to the server configuration. The above screenshot, published by a Twitter user calling himself Mr. Green, is just one example of such an outside access.

"Somehow, the person(s) setting up the original uploading (=seeding) of the file forgot to password protect the Web interface, or turn the feature off," Per Thorsheim, an independent security researcher in Bergen, Norway, told Ars. "I suspect [the hackers] used the Web interface to administer the various uploads of the leaks using BitTorrent."

The box seeding the torrent was located at 94.102.63.121. Police and private investigators working feverishly to identify the people who hacked Ashley Madison and published user profiles, transactions, credit-card data, and a wide range of other sensitive data will almost certainly try to perform a forensic analysis of the physical server. They are also sure to check how the server was accessed. If the hackers didn't use Tor or a similar anonymity service, the investigators may be able to collect clues from the IP address used to log in to the box.
15 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Ashley Madison hackers leave footprints that may help investigators (Original Post) steve2470 Aug 2015 OP
I understand it's theft. Glassunion Aug 2015 #1
Yeah, but some of them might not actually be customers. Frank Cannon Aug 2015 #3
I highly doubt that. Glassunion Aug 2015 #4
You could just do it to get him on amusing mailing lists. Frank Cannon Aug 2015 #7
I don't doubt that, we've done it to coworkers. Glassunion Aug 2015 #8
If some jerkoff hackers think they can enforce Blue_Tires Aug 2015 #13
you nailed it n/t Psephos Aug 2015 #14
I hear you. They are thieves. Glassunion Aug 2015 #15
I find it tough to beleive the hacker wouldn't be using TOR or a VPN Travis_0004 Aug 2015 #2
+1 Go Vols Aug 2015 #5
Was about to post something similar. Fawke Em Aug 2015 #6
I was going to respond like this... Oilwellian Aug 2015 #12
That could be the IP address of the last proxy server Gman Aug 2015 #9
Checklists fellas, checklists. n/t A HERETIC I AM Aug 2015 #10
Breaking news - Ashley Madison users leave stains PufPuf23 Aug 2015 #11

Glassunion

(10,201 posts)
1. I understand it's theft.
Sat Aug 22, 2015, 12:35 PM
Aug 2015

However I struggle to have any sympathy for the owners and customers of the websites.

Frank Cannon

(7,570 posts)
3. Yeah, but some of them might not actually be customers.
Sat Aug 22, 2015, 12:47 PM
Aug 2015

A "burner" debit card and your boss' email address, and you could get back at that bastard for not giving you a bonus this year.

Frank Cannon

(7,570 posts)
7. You could just do it to get him on amusing mailing lists.
Sat Aug 22, 2015, 01:05 PM
Aug 2015

Imagine him getting e-mails from Brazzers sent to his work ten times a day.

Glassunion

(10,201 posts)
8. I don't doubt that, we've done it to coworkers.
Sat Aug 22, 2015, 01:19 PM
Aug 2015

But to go through the trouble of signing him up for a discreet website and providing payment for it... Sort of far fetched.

Blue_Tires

(55,445 posts)
13. If some jerkoff hackers think they can enforce
Sun Aug 23, 2015, 01:20 AM
Aug 2015

their sexual mores on the rest of us, where does it end??

Glassunion

(10,201 posts)
15. I hear you. They are thieves.
Sun Aug 23, 2015, 06:13 PM
Aug 2015

In the particular instance I have a hard time digging up empathy for the victims.

But, that does not mean that I don't want the thieves prosecuted.

 

Travis_0004

(5,417 posts)
2. I find it tough to beleive the hacker wouldn't be using TOR or a VPN
Sat Aug 22, 2015, 12:41 PM
Aug 2015

I get they have to investigate, but I would be amazed if that IP address helps them in anyway. I can't imagine an experienced hacker being so careless.

Fawke Em

(11,366 posts)
6. Was about to post something similar.
Sat Aug 22, 2015, 12:55 PM
Aug 2015

I think the feds just want the average American to think they have a handle on cyber crime, but they really don't.

Oilwellian

(12,647 posts)
12. I was going to respond like this...
Sat Aug 22, 2015, 02:08 PM
Aug 2015
If the hackers didn't use Tor

What hacker doesn't use Tor?

Sheesh.

Gman

(24,780 posts)
9. That could be the IP address of the last proxy server
Sat Aug 22, 2015, 01:44 PM
Aug 2015

Someone bounced off to get there. Could be a dead end, in other words.

PufPuf23

(8,839 posts)
11. Breaking news - Ashley Madison users leave stains
Sat Aug 22, 2015, 01:57 PM
Aug 2015

in my beautiful mind and heartbreak to their spouses and families.

What a distraction.

Latest Discussions»General Discussion»Ashley Madison hackers le...