{"id":45021,"date":"2015-08-26T12:16:25","date_gmt":"2015-08-26T19:16:25","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=45021"},"modified":"2025-05-27T22:32:00","modified_gmt":"2025-05-28T05:32:00","slug":"ashleymadison-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/","title":{"rendered":"AshleyMadison Hack Demonstrates Power of Scam Artists"},"content":{"rendered":"<p><em>This blog post was written by Armando Rodriguez.<\/em><\/p>\n<p>Last month, cybersecurity journalist Brian Krebs <a href=\"http:\/\/krebsonsecurity.com\/2015\/08\/leaked-ashleymadison-emails-suggest-execs-hacked-competitors\/\">broke the news <\/a>that adult site AshleyMadison.com was hacked. This breach risked the exposure of 32 million users&#8217; personal information, including email addresses, physical addresses, and credit card information. It comes as no surprise that this news made headlines immediately and the resulting aftermath has kept it in the news almost every day since then.<\/p>\n<h2>Sample Email Subjects Hackers Use<\/h2>\n<p>Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation. Based on our tracking of spam emails designed to exploit its customers, McAfee Messaging Security Team has put together a list of samples seen in the wild.<\/p>\n<p>Sample email subjects:<\/p>\n<ul>\n<li>Ashley Madison hacked, is your spouse cheating?<\/li>\n<li>Ashley Madison records leak<\/li>\n<li>Hacked: Emails by Ashley Madison<\/li>\n<li>How to Check if You Were Exposed in Ashley Madison Hack<\/li>\n<li>How to search the Ashley Madison leak<\/li>\n<\/ul>\n<p>Sample \u201cFrom\u201d addresses, mostly spoofing news outlets to dupe readers into believing the sources are legitimate:<\/p>\n<ul>\n<li>&#8220;Ashley Madison Alert&#8221; &lt;info@baizetwit.com&gt;<\/li>\n<li>&#8220;CNN News&#8221; &lt;info@baizetwit.com&gt;<\/li>\n<li>&#8220;CBS News&#8221; &lt;info@baizetwit.com&gt;<\/li>\n<li>&#8220;Fox News&#8221; &lt;info@baizetwit.com&gt;<\/li>\n<\/ul>\n<p>Upon opening the spam, a user sees this:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45015\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg\" alt=\"20150825 Ashley 1.jpg\" width=\"300\" height=\"262\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-1.jpg-1024x894.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-1.jpg.jpg 1077w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The link embedded in the samples follow this pattern:<\/p>\n<p>hxxp:\/\/mx7c68.baizetwit.com\/random_string\/random_string\/random_string<\/p>\n<p>The URL redirects to the following link, which appears to deny connections from security vendor IP space:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-2.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45016\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-2.jpg-300x66.png\" alt=\"20150825 Ashley 2.jpg\" width=\"300\" height=\"66\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-2.jpg-300x66.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-2.jpg.png 602w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>By using a free web proxy, we can follow the campaign through to the next layer of redirection:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-3.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45017\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-3.jpg-300x87.png\" alt=\"20150825 Ashley 3.jpg\" width=\"300\" height=\"87\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-3.jpg-300x87.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-3.jpg.png 531w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The preceding .html document contains an HTTP refresh to accomplish the final layer of redirection, ultimately leading to a \u201cgaming wonderland\u201d toolbar download:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-4.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45018\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-4.jpg-300x288.png\" alt=\"20150825 Ashley 4.jpg\" width=\"300\" height=\"288\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-4.jpg-300x288.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-4.jpg-32x32.png 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-4.jpg.png 960w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>At this point, when the user installs the toolbar, the spammer monetizes his or her efforts through an affiliate program:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-5.jpg.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-45019\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-5.jpg-300x48.png\" alt=\"20150825 Ashley 5.jpg\" width=\"300\" height=\"48\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-5.jpg-300x48.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-5.jpg.png 991w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>We also identified a second spam campaign leveraging a more direct approach to monetizing the stolen data. In this case, spammers have created several look-alike domains to increase the perception of legitimacy. WHOIS lookups confirm that either the domains do not exist or were created on or after August 23.<\/p>\n<p>Here are a few observed sending addresses:<\/p>\n<ul>\n<li>bounce@ashleymadisondata.co.uk<\/li>\n<li>bounce@ashleymadisondata.info<\/li>\n<li>bounce@ashleymadisonnews.net<\/li>\n<li>bounce@ashleymadisonteam.com<\/li>\n<\/ul>\n<p>Sample subjects associated with this campaign:<\/p>\n<ul>\n<li>Your Ashley Madison Account<\/li>\n<li>Your Ashley Madison Profile<\/li>\n<li>Ashley Madison<\/li>\n<\/ul>\n<p>With this variant, there is no convoluted trail of web links to monetize the topic matter. Instead, we see a clear attempt at extortion, threatening to notify friends and family of the Ashley Madison account holder unless funds are paid into a Bitcoin account. Here is the text contained within the email:<\/p>\n<p style=\"padding-left: 30px;\">Your data was leaked in the recent leaking of Ashley Madison and I now have your information. I have also used your info to find your Facebook page, using this I now have a direct line to contact all your friends and family.<\/p>\n<p style=\"padding-left: 30px;\">If you would like to stop me from sharing this dirt with all of your known friends and family (and perhaps even your employers too?) then you need to send exactly 1.05 bitcoins to the following BTC address.<\/p>\n<p style=\"padding-left: 30px;\">Bitcoin Address:<br \/>\n112ZTAjYSBqgppj1HB5ewFsHp4ZXXXXXXXX<\/p>\n<p style=\"padding-left: 30px;\">You may be wondering why should you and what will prevent other people from doing the same, in short you now know to change your privacy settings on Facebook so no one can view your friends\/family list. So go ahead and<br \/>\nupdate that now (I have a copy if you don&#8217;t pay) to stop any future e-mails like this.<\/p>\n<p style=\"padding-left: 30px;\">You can buy Bitcoin&#8217;s using online exchanges easily. If the Bitcoin is not paid within 3 days of 23 &#8211; August &#8211; 2015 then my system will automatically message all your friends and family. The bitcoin address is unique to YOU.<\/p>\n<p style=\"padding-left: 30px;\">Consider how expensive a divorce lawyer is. If you are no longer in a committed relationship then think about how this will affect your social standing amongst family and friends. What will your friends and family think about you?<\/p>\n<p style=\"padding-left: 30px;\">Sincerely,<br \/>\nDuran<\/p>\n<p>With both campaigns, no evidence was found indicating\u00a0 recipients were targeted by leaked data, so the risk is not limited to Ashley Madison clientele. Our research indicates that even the idly curious are at risk. Spammers have a history of using current events to motivate victims to divulge personal information they shouldn\u2019t, visit a risky website, and even unwittingly install a virus. Just as scam artists have taken advantage of natural disasters to dupe people into giving money to them, scammers are taking advantage of this social turmoil as well.<\/p>\n<p>McAfee customers are protected from these threats. Anyone who sees one of these campaigns in his or her inbox should submit the email to the IT help desk for analysis and delete the message before curiosity wins out over suspicion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news that adult site&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,3952],"coauthors":[3973],"class_list":["post-45021","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-internet-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-26T19:16:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-1.jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1077\" \/>\n\t<meta property=\"og:image:height\" content=\"940\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"AshleyMadison Hack Demonstrates Power of Scam Artists\",\"datePublished\":\"2015-08-26T19:16:25+00:00\",\"dateModified\":\"2025-05-28T05:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\"},\"wordCount\":813,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg\",\"keywords\":[\"computer security\",\"cybercrime\",\"internet security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\",\"name\":\"AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg\",\"datePublished\":\"2015-08-26T19:16:25+00:00\",\"dateModified\":\"2025-05-28T05:32:00+00:00\",\"description\":\"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"AshleyMadison Hack Demonstrates Power of Scam Artists\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog","description":"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog","og_description":"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-08-26T19:16:25+00:00","article_modified_time":"2025-05-28T05:32:00+00:00","og_image":[{"width":1077,"height":940,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/20150825-Ashley-1.jpg.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"AshleyMadison Hack Demonstrates Power of Scam Artists","datePublished":"2015-08-26T19:16:25+00:00","dateModified":"2025-05-28T05:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/"},"wordCount":813,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg","keywords":["computer security","cybercrime","internet security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/","name":"AshleyMadison Hack Demonstrates Power of Scam Artists | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg","datePublished":"2015-08-26T19:16:25+00:00","dateModified":"2025-05-28T05:32:00+00:00","description":"Spammers have a history of using current events to their advantage and the Ashley Madison scandal is ripe for such exploitation.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/20150825-Ashley-1.jpg-300x262.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ashleymadison-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"AshleyMadison Hack Demonstrates Power of Scam Artists"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=45021"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45021\/revisions"}],"predecessor-version":[{"id":214557,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45021\/revisions\/214557"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=45021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=45021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=45021"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=45021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}