{"id":13228,"date":"2017-07-17T13:30:47","date_gmt":"2017-07-17T13:30:47","guid":{"rendered":"https:\/\/digital-sentinel.com\/?p=13228"},"modified":"2020-02-01T11:39:53","modified_gmt":"2020-02-01T11:39:53","slug":"ashley-madison-data-breach-leads-11-2m-settlement","status":"publish","type":"post","link":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/","title":{"rendered":"Ashley Madison data breach leads to $11.2m settlement"},"content":{"rendered":"

Parent company Ruby Corp will pay 37 million users – report<\/h2>\n
\n

17\/07\/2016:\u00a0<\/strong>The parent company of extramarital dating site Ashley Madison committed to pay $11.2 million to 37 million former site users on Friday, who are suing it after a hack leaked their personal details in a data breach in July 2015.<\/p>\n

Ruby Corp, which was previously known as Avid Life Media, denied any wrongdoing as part of the settlement, according to\u00a0CNBC<\/em><\/a>.<\/p>\n

The leak reportedly led to people committing suicide, as well as leaving those whose details were exposed open to blackmail.<\/p>\n

Hacking group The Impact Team released the\u00a0personal information of 37 million of the website’s users<\/a>\u00a0after Avid Life Media ignored its demand for it to take down Ashley Madison and similar sites it owned.<\/p>\n

At the time, The Impact Team said: \u201cAvid Life Media has failed to take down Ashley Madison and Established Men. We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data.\u201d<\/p>\n

Ruby Corp was forced to spend millions improving its security and privacy measures, and the breach reportedly cost Ruby Corp more than a quarter of its revenue.<\/p>\n

Victims can be awarded up to $3,500 depending on how well they can prove that any losses they experienced were linked to the breach,\u00a0CNBC<\/em>reported, adding\u00a0that lawyers for Ashley Madison may receive up to one-third of the $11.2 million pay out to cover legal fees.<\/p>\n

Ruby Corp has told\u00a0IT Pro<\/em>\u00a0that it will not be providing a comment as the court case is still ongoing.<\/p>\n

\n
See related<\/div>\n
\n
Ashley Madison hack steals 37 million cheaters’ details<\/a><\/div>\n
Love lives laid bare: are dating sites a magnet for hackers?<\/a><\/div>\n<\/div>\n<\/div>\n

05\/07\/2016:<\/strong>\u00a0Ashley Madison’s parent company is being investigated by the US Federal Trade Commission, after last year’s catastrophic hack revealed that the company used chatbots and fake profiles to entice customers.<\/p>\n

Avid Life Media yesterday revealed the appointments of CEO Rob Segal and President James Millership, who confirmed that the extramarital dating site has five male users for every one female in\u00a0an interview with\u00a0Reuters<\/em><\/a>.<\/p>\n

The gender imbalance was first revealed during a massive cyber attack in August 2015, which leaked the personal data of up to 37 million prospective cheaters online.<\/p>\n

An Ernst and Young report commissioned by ALM itself confirmed that the company was using AI chatbots, who posed as available women to keep male members engaged with the site.<\/p>\n

The practice had been discontinued worldwide by late 2015, but Segal confirmed that the issue is “part of the ongoing process” and is “with the FTC right now”.<\/p>\n

Although ALM told\u00a0Reuters<\/em>\u00a0that it does not know the specific subject of the investigation, similar practices earned another dating site a fine of over $616 million from the FTC in 2014.<\/p>\n

Segal also revealed that the company still has no idea who carried out the attack or how they did it. However, Robert Masse, who leads the Deloitte experts hired to shore up the company’s security in the wake of the attack, told\u00a0Reuters<\/em>\u00a0that his team found “simple backdoors” into the company’s servers.<\/p>\n

In addition to investing in increased security, the company is also looking to patch up its shattered reputation by pivoting away from infidelity and illicit affairs, with Segal adding that “the Ashley Madison brand can be repositioned”.<\/p>\n

05\/02\/2016:\u00a0<\/strong>Cheater’s dating website Ashley Madison has countered privacy concerns by allowing users to mask their profile pictures.<\/p>\n

The company was hit by a catastrophic hack last summer, when intruders released the personal information of 37 million of its adulterous clients.<\/p>\n

It has now taken new steps to prevent users of the site from being identified. “We respect your need for discretion,” the site says, “so we’ve added some tools to keep your identity a secret”.<\/p>\n

Users can add a Zorro-style ‘domino’ mask in either black or brown, or blur out the photo. They can also add a black bar over the eyes to redact their identity.<\/p>\n

The new feature has attracted criticism on social media, where some have noted that it makes users look like criminals.<\/p>\n

It’s also baffling on a number of levels. Not only does obscuring your identity complete defeat the purpose of adding a facial profile picture in the first place, it also does nothing to address the more pressing concern that the site may be hacked again.<\/p>\n

Parent company Avid Life Media has yet to announce any further security improvements since hackers ran rampant on its network, which may continue to worry users.<\/p>\n

30\/12\/2015:<\/strong>\u00a0Ashley Madison has revealed that its subscriber numbers are up significantly, despite reports many of its users have been blackmailed by the hackers that leaked member details.<\/p>\n

Recent figures displayed on the website reveal 43.4m people are now members of the site, up from 37m when the dating site was first hacked in August. The achievement is surprising, considering information about up to 32m users were circulated around the internet at the time.<\/p>\n

However, a spokesperson for Avid Life Media, the parent company of the site that encourages adultery, refused to comment on why it thinks user numbers have increased and it would not be making any further comment in future.<\/p>\n

Whether the numbers reflected on the homepage of the website are real cannot be proven, although the company did say at the time of the attack that its user numbers hadn’t been affected and actually, the ration of men to women had not changed as a result of details being leaked.<\/p>\n

Earlier in December, it was revealed Ashley Madison users had been receiving blackmail threats in the post.<\/p>\n

15\/12\/2015:<\/strong>\u00a0According to IT security expert Graham Cluley, readers of his\u00a0blog<\/a>\u00a0have received letters in the post demanding money to prevent their details on the hacked website being exposed to others.<\/p>\n

“I just received a physical postal letter to my house asking for $4167 USD or exposed my AM account to people close to me. is your advice the same as in your vid about email blackmail?” said the reader.<\/p>\n

Cluley said, in this case, it was very likely that the blackmailers were “trying their luck, hoping that a small percentage of those targeted will pay up.”<\/p>\n

Cluley added that he couldn’t see what the blackmailers have to gain from going through with their threats.<\/p>\n

“Because, if they tell people close to you then they are ruining any chances that you will\u00a0ever<\/em>\u00a0pay up. Think of it from their point of view. It’s a dumb business model.<\/p>\n

“In fact, the only scenario I can imagine that might make sense for the blackmailer to go through with their threats is if they are specifically targeting you and aren’t being primarily incentivised by the money, but a personal issue with you instead. In which case paying the money may not help anyway,” said Cluley.<\/p>\n

He said that any victims should report the matter to the authorities and request discretion.<\/p>\n

“If the police are to successfully build a case against someone they will be looking for evidence like this.”<\/p>\n

14\/09\/2015:\u00a0<\/strong>Amazon Web Services (AWS) and GoDaddy are no longer defendants in an Ashley Madison lawsuit attempting to force websites to delete information about users of the infidelity dating site.<\/p>\n

The complaint from three anonymous plaintiffs, all termed John Does, from\u00a0California, New Jersey, and Maryland,\u00a0has been issued against 20 unnamed defendants, all called John Roe numbers 1-20, who offer access to customer details contained in last month\u2019s leak, which put the details of 33 million Ashley Madison users on the dark web.<\/p>\n

However, both AWS and GoDaddy are no longer listed alongside the 20 John Roes after being dismissed without prejudice last week, according to\u00a0The Register<\/a><\/em>.<\/p>\n

The lawsuit will continue to attempt to force the remaining 20 defendants \u2013 who the prosecution cannot identify \u2013 to delete the details of the three Ashley Madison users who are plaintiffs in the case.<\/p>\n

They \u201chave been gravely affected by the stolen data and are now subject to threats and extortion\u201d, claims the complaint.<\/p>\n

Prosecutors have applied for a Temporary Restraining Order (TRO) against these 20 defendants\u2019 websites, which the complaint claims is justified by the plaintiffs\u2019 probably chances of success.<\/p>\n

However, one of the sites allegedly belonging to the defendants, adulterysearch.com, released\u00a0a statement<\/a>\u00a0in response to the lawsuit.<\/p>\n

It read: \u201cIt has come to our attention that the anonymous plaintiffs in the Arizona lawsuit\u00a0are seeking a temporary restraining order to shut down this website and others, citing “ongoing exposure to irreparable injury”\u00a0if their information is made available to those who wish to see it.<\/p>\n

\u201cThe legal arguments in the application for the TRO are weak (for example, the\u00a0plaintiffs have not demonstrated success on the merits for a variety of reasons). Nonetheless, if the plaintiffs\u00a0identify themselves to us, we will remove their information from the database we use. This will negate\u00a0any alleged “ongoing” harm\u00a0pending the resolution of the litigation, which we are confident will be in our favor.\u201d<\/p>\n

01\/09\/2015:\u00a0<\/strong>Hundreds of thousands of people joined infidelity dating site Ashley Madison last week, its owner has claimed, despite hackers spilling the details of 33 million users online.<\/p>\n

The overall unspecified figure included 87,596 women, parent company Avid Life Media said in a\u00a0blog post<\/a>, writing: “Despite having our business and customers attacked, we are growing”.<\/p>\n

Women users of the site sent 2.8 million messages last week, ALM added, in a blog entry\u00a0suggesting the business is garnering interest in spite of a controversial hack which led to suicides and lawsuits against the company.<\/p>\n

It read: “Furthermore, in the first half of this year the ratio of male members who paid to communicate with women on our service versus the number of female members who actively used their account (female members are not required to pay to communicate with men on Ashley Madison)\u00a0was 1.2 to 1.”<\/p>\n

28\/08\/2015:\u00a0<\/strong>Ashley Madison CEO Noel Biderman has left the company after 33 million customer details were hacked and posted online.<\/p>\n

A statement released by the infidelity dating site’s owner, Avid Life Media (ALM), said the decision was mutual,\u00a0adding<\/a>: “This change is\u00a0in the best interest of the company and allows us to continue to provide support to our members and dedicated employees. We are steadfast in our commitment to our\u00a0customer base.”<\/p>\n

The leaked information has resulted in suicides and lawsuits against ALM as the fallout from July’s cyber attack continues.<\/p>\n

With ALM offering a \u00a3240,000 reward for information on the hackers belonging to Impact Group, which claims to be behind the data leak, the company reiterated its intention to catch those responsible.<\/p>\n

“We are actively adjusting to the attack on our business and members\u2019 privacy by criminals. We will continue to provide access to our unique platforms for our worldwide members,” the statement read.<\/p>\n

“We are actively cooperating with international law enforcement in an effort to bring those responsible for the theft of proprietary member and business information to justice.”<\/p>\n

The existing management team of ALM will continue running the company until a new CEO is found.<\/p>\n

25\/08\/2015:\u00a0<\/strong>The drama surrounding the Ashley Madison breach continues, as it now emerges that the CTO may have hacked competitors prior to ALM being hacked itself.<\/p>\n

Security expert\u00a0Brian Krebs<\/a>\u00a0highlighted an email correspondence between CEO Noel Biderman and ex-CTO Raja Bhatia, released as part of cybercriminal group Impact Team\u2019s catastrophic hack last month, which resulted in 33 million users’ details leaking online last week.<\/p>\n

The emails reveal that founding executive Bhatia discovered a security flaw in rival site Nerve.com, which allowed him widespread access to the site\u2019s back-end operations.<\/p>\n

Bhatia stated that he could \u201cturn any non-paying user into a paying user, vice versa, compose messages between users, check unread stats, etc\u201d, and claimed that Nerve \u201cdid a very lousy job building their platform\u201d.<\/p>\n

The trove of emails also contains further evidence that ALM executives were aware of certain security vulnerabilities\u00a0before the hacks even took place<\/a>.<\/p>\n

Security director Mark Steele \u2013 the only person that Impact Team has thus far apologised to \u2013 noted just months before the attack that \u201cour codebase\u00a0has many (riddled?)\u00a0XSS\/CRSF\u00a0vulnerabilities which are relatively easy to find\u201d.<\/p>\n

He also mentioned that \u201cother vulnerabilities would be things like SQL injection\/data leaks, which would be much more damaging\u201d.<\/p>\n

These emails lend weight to claims that ALM did an inadequate job of protecting itself and its users\u2019 data \u2013 claims that have seen one disgruntled customer pursuing legal action.<\/p>\n

A Californian man is suing ALM for negligence and claims he suffered \u2018emotional distress\u2019 as a result of Ashley Madison\u2019s breach.<\/p>\n

The suit seeks unspecified damages, and is aiming to be deemed a \u2018class action\u2019. It’s the latest in a string of consequences from the breach, with police reporting that two Canadians have taken their own lives following the Ashley Madison attack.<\/p>\n

Although Toronto police wouldn’t give further details about the two deaths linked to the hack, acting staff superintendent Bryce Evans issued a statement to the hackers, saying: “I want to make it very clear to you your actions are illegal and we will not be tolerating them. This is your wake-up call.”<\/p>\n

Avid Life Media is now offering a \u00a3240,000 reward for any information about the identity or whereabouts of the criminals involved while the Toronto police department has set up a Twitter account\u00a0@AMCaseTPS<\/a>and hashtag #AMCaseTPS for anyone with any information about the attack to share it.<\/p>\n

US Magazine<\/a><\/em>\u00a0reported that one of the victims was Captain Michael Gorhum who had been working for the San Antonio Police for 25 years. This has not been confirmed by official sources.<\/p>\n

Extortionists have already begun targetting Ashley Madison users, according to security researcher Brian Krebs.<\/p>\n

As reported by\u00a0Krebs on Security<\/a><\/em>, users whose data was stolen in last month’s hack and posted online last week are being targeted with blackmail threats from opportunists who threaten to expose their membership of the site if they do not pay up.<\/p>\n

One user known only as Mac told Krebs: “They have my home billing address and first and last name, so it would be relatively easy for them to get my home records and figure out who I am.<\/p>\n

“I’ll accept the consequences if this does get disclosed, but obviously, I’d rather not have that happen because my wife and I are both very happy in our marriage.”<\/p>\n

This will continue to happen, said Tom Kellerman, chief cybersecurity officer at Trend Micro, and could also grow to include widespread ransomware attacks.<\/p>\n

“There is going to be a dramatic crime wave of these types of virtual shakedowns, and they’ll evolve into spear-phishing campaigns that leverage crypto malware,” he said. “The same criminals who enjoy deploying ransomware would love to use this data.”<\/p>\n

Lawsuit<\/h3>\n

Two Canadian law firms have filed a \u00a3367 million joint lawsuit against Avid Dating Life and Avid Life Media, the companies behind Ashley Madison, on behalf of a number of former users, following Impact Team’s posting of 32 million users’ details onto the dark web.<\/p>\n

“Numerous former users of AshleyMadison.com have approached the law firms to inquire about their privacy rights under Canadian law,” Charney Lawyers and Sutts, Strosberg LLP\u00a0said in a joint statement<\/a>.<\/p>\n

“They are outraged that AshleyMadison.com failed to protect its users’ information. In many cases, the users paid an additional fee for the website to remove all of their user data, only to discover that the information was left intact and exposed.”<\/p>\n

However, the companies said action will not be taken against Impact Team, the hackers who stole and later released the source code of the site.<\/p>\n

Source code leak<\/h3>\n

The news comes less than a week after the cybercriminal collective behind the\u00a0Ashley Madison hack<\/a>\u00a0leaked the extramarital dating site’s source code, clearing the path for other hackers to attack the site’s parent company.<\/p>\n

Impact Team’s second file dump in three days after\u00a0stealing 37 million customer records in July<\/a>\u00a0also included\u00a0what appears to be a file containing the email correspondence of CEO and self-proclaimed \u201cking of infidelity\u201d Noel Biderman, but it was corrupted and unreadable.<\/p>\n

However, by releasing what initially looks like the complete source code repositories for all the websites owned by Ashley Madison’s parent company, Avid Life Media (ALM), other cyber criminals can identify flaws and vulnerabilities at their leisure.<\/p>\n

Chris Boyd, malware intelligence analyst at Malwarebytes, was less than optimistic about the potential consequences for ALM and its other sites, Established Men and Cougar Life.<\/p>\n

\u201cThe leak of the source code spells more bad news for Ashley Madison,\u201d he said. \u201cIt could result in more deep-dives into their infrastructure and anything else they’re desperately trying to retain control over.”<\/p>\n

\u201cThe only real good news they’ve had is that the personal communications of their CEO have apparently been damaged in the leak\u201d, he added, before noting that \u201cthis is likely small consolation to the many affected users of the site caught in the fallout\u201d.<\/p>\n

This new leak indicates that Impact Team is not content to merely damage Ashley Madison \u2013 they want to destroy it entirely, along with its sister sites.<\/p>\n

The most recent infodump weighed in at 20GB \u2013 twice the size of the file released on Tuesday, 18 August containing up to 32 million\u00a0customers’<\/a>\u00a0details.<\/p>\n

This suggests that Impact Team may have access to an almost limitless amount of information and that these leaks could even escalate in size and severity.<\/p>\n

The latest attack comes just two days after the identities of millions of potentially cheating spouses were exposed\u00a0online<\/a>\u00a0by Impact Team.<\/p>\n

The group threated to post the data if Ashley Madison wasn\u2019t shut down immediately, along with sister sites like Cougar Life and Established Men owned by Avid Life Media.<\/p>\n

Almost exactly a month after that warning, Impact Team delivered on its threat, posting an information dump of almost 10GB to the dark web and file-sharing sites, thought to contain the details of 32 million users of Ashley Madison.<\/p>\n

\u201cAvid Life Media has failed to take down Ashley Madison and Established Men\u201d, Impact Team wrote as part of the release.<\/p>\n

\u201cWe have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data.\u201d<\/p>\n

The file contains the personal details, email addresses and payment information of at least 30 million users, with some putting the number as high as 37 million.<\/p>\n

Thousands of email addresses appear to belong to public sector officials, including thousands of .gov domains, but\u00a0independent security adviser\u00a0Per Thorsheim<\/a>\u00a0pointed out that Ashley Madison does not require any form of email verification during sign-up.<\/p>\n

This means it is virtually impossible to ascertain whether or not the addresses actually belong to who they seem to – likely, many do not.<\/p>\n

Security analyst Graham Cluley\u00a0added<\/a>: “I could have created an account at Ashley Madison with the address of\u00a0barack.obama@whitehouse.gov<\/a>, but it wouldn’t have meant that Obama was a user of the site.”<\/p>\n

Thorsheim and others have also warned that widespread dissemination of the details contained in the leak could lead to extreme consequences, up to and including\u00a0suicide<\/a>.<\/p>\n

For example, it\u2019s not made clear how recently, or how often, an account was used. There\u2019s no distinction within the file between prolific serial adulterers and those who signed up once just to see what it was like.<\/p>\n

Impact Team has also qualified the release by saying that \u201c90-95 per cent of users are male. Chances are, your man signed up on the world\u2019s biggest affair site, but never had one. He just tried to\u201d.<\/p>\n

Other security experts condemned Impact Team’s actions, with George Anderson, director of the cybersecurity firm Webroot, saying:\u00a0\u201cWhilst readers’ morals may conflict either seeing this group of hackers as good or bad guys, the fact remains that the Impact Team illegally obtained sensitive personal info.<\/p>\n

\u201cI\u2019d imagine the fall-out is divorces, firings, and blackmail \u2013 really personally malicious and upsetting stuff. There are no moral judgments on this except the immorality of hackers.\u201d<\/p>\n

He also noted that \u201cwhat\u2019s more worrying is what they are not releasing and instead using as blackmail. I don\u2019t think this is just a sophisticated \u2018kiss \u2018n tell\u2019”.<\/p>\n

Security expert\u00a0Brian Krebs<\/a>\u00a0and others have reportedly verified the dump through anonymous sources who found their data in it.<\/p>\n

Phishing attacks<\/h3>\n

The widespread release of email addresses could lead to a deluge of phishing attacks, warned Barracuda Networks, where users used their own emails or others used real email addresses that were not their own.<\/p>\n

Wieland Alge, VP and General Manager EMEA, said:\u00a0\u201cWith a number of users signing up with work email addresses, phishing attacks could be launched against users via these accounts, meaning government and corporate networks are at risk.<\/p>\n

\u201cHaving access to the data could allow the hackers to build a detailed profile of their target and create a very specific attack. After building the profile, the attack is likely to come from a ‘trusted source’ and this makes the chances of a successful attack considerably higher.”<\/p>\n

Cyber security firm Blue Coat warned blackmail will rear its head too.<\/p>\n

Its cyber research team said in a statement: “Not all of the personal data of Ashley Madison users has been released, therefore cyber attackers may go directly to the management, or to the individual users of Ashley Madison and ask for a payment for the release\/deletion of personal data. Blackmail can also happen through non-financial means by coercing victims into working with the attackers as an insider.”<\/p>\n

Ashley Madison response<\/h3>\n

A spokesperson from Ashley Madison said: \u201cThis event is not an act of hacktivism, it is an act of criminality. It is an illegal action against the individual members of AshleyMadison.com, as well as any freethinking people who choose to engage in fully lawful online activities.<\/p>\n

\u201cThe criminal, or criminals, involved in this act have appointed themselves as the moral judge, juror and executioner, seeing fit to impose a personal notion of virtue on all of society. We will not sit idly by and allow these thieves to force their personal ideology on citizens around the world.\u201d<\/p>\n<\/div>\n

\n
<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

Parent company Ruby Corp will pay 37 million users – report 17\/07\/2016:\u00a0The parent […]<\/p>\n","protected":false},"author":3,"featured_media":13229,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[39],"tags":[],"yoast_head":"\nAshley Madison data breach leads to $11.2m settlement - Digital Sentinel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ashley Madison data breach leads to $11.2m settlement - Digital Sentinel\" \/>\n<meta property=\"og:description\" content=\"Parent company Ruby Corp will pay 37 million users – report 17\/07\/2016:\u00a0The parent […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Sentinel\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-17T13:30:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-01T11:39:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"349\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital-Sentinel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/digital-sentinel.com\/#organization\",\"name\":\"Digital Sentinel\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif\",\"width\":613,\"height\":224,\"caption\":\"Digital Sentinel\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digital-sentinel.com\/#website\",\"url\":\"https:\/\/digital-sentinel.com\/\",\"name\":\"Digital Sentinel\",\"description\":\"Profit Protection Technology\",\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digital-sentinel.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png\",\"contentUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png\",\"width\":620,\"height\":349},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage\",\"url\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/\",\"name\":\"Ashley Madison data breach leads to $11.2m settlement - Digital Sentinel\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage\"},\"datePublished\":\"2017-07-17T13:30:47+00:00\",\"dateModified\":\"2020-02-01T11:39:53+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digital-sentinel.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ashley Madison data breach leads to $11.2m settlement\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage\"},\"author\":{\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\"},\"headline\":\"Ashley Madison data breach leads to $11.2m settlement\",\"datePublished\":\"2017-07-17T13:30:47+00:00\",\"dateModified\":\"2020-02-01T11:39:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage\"},\"wordCount\":3650,\"publisher\":{\"@id\":\"https:\/\/digital-sentinel.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png\",\"articleSection\":[\"breach\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2\",\"name\":\"Digital-Sentinel\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/digital-sentinel.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g\",\"caption\":\"Digital-Sentinel\"},\"url\":\"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ashley Madison data breach leads to $11.2m settlement - Digital Sentinel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/","og_locale":"en_US","og_type":"article","og_title":"Ashley Madison data breach leads to $11.2m settlement - Digital Sentinel","og_description":"Parent company Ruby Corp will pay 37 million users – report 17\/07\/2016:\u00a0The parent […]","og_url":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/","og_site_name":"Digital Sentinel","article_published_time":"2017-07-17T13:30:47+00:00","article_modified_time":"2020-02-01T11:39:53+00:00","og_image":[{"width":620,"height":349,"url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png","type":"image\/png"}],"twitter_card":"summary","twitter_misc":{"Written by":"Digital-Sentinel","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/digital-sentinel.com\/#organization","name":"Digital Sentinel","url":"https:\/\/digital-sentinel.com\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#logo","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/Digital-Sentinel.gif","width":613,"height":224,"caption":"Digital Sentinel"},"image":{"@id":"https:\/\/digital-sentinel.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/digital-sentinel.com\/#website","url":"https:\/\/digital-sentinel.com\/","name":"Digital Sentinel","description":"Profit Protection Technology","publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digital-sentinel.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage","inLanguage":"en-US","url":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png","contentUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png","width":620,"height":349},{"@type":"WebPage","@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage","url":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/","name":"Ashley Madison data breach leads to $11.2m settlement - Digital Sentinel","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage"},"datePublished":"2017-07-17T13:30:47+00:00","dateModified":"2020-02-01T11:39:53+00:00","breadcrumb":{"@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digital-sentinel.com\/"},{"@type":"ListItem","position":2,"name":"Ashley Madison data breach leads to $11.2m settlement"}]},{"@type":"Article","@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#article","isPartOf":{"@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage"},"author":{"@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2"},"headline":"Ashley Madison data breach leads to $11.2m settlement","datePublished":"2017-07-17T13:30:47+00:00","dateModified":"2020-02-01T11:39:53+00:00","mainEntityOfPage":{"@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#webpage"},"wordCount":3650,"publisher":{"@id":"https:\/\/digital-sentinel.com\/#organization"},"image":{"@id":"https:\/\/digital-sentinel.com\/breach\/ashley-madison-data-breach-leads-11-2m-settlement\/#primaryimage"},"thumbnailUrl":"https:\/\/digital-sentinel.com\/wp-content\/uploads\/ashley_madison_settlement.png","articleSection":["breach"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/digital-sentinel.com\/#\/schema\/person\/78a25f0a40a470633a45d6c98b60f0b2","name":"Digital-Sentinel","image":{"@type":"ImageObject","@id":"https:\/\/digital-sentinel.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34ea0504bbaf2d4274b9488fb3281aa1?s=96&d=mm&r=g","caption":"Digital-Sentinel"},"url":"https:\/\/digital-sentinel.com\/author\/digital-sentinel\/"}]}},"_links":{"self":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13228"}],"collection":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/comments?post=13228"}],"version-history":[{"count":1,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13228\/revisions"}],"predecessor-version":[{"id":13340,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/posts\/13228\/revisions\/13340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media\/13229"}],"wp:attachment":[{"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/media?parent=13228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/categories?post=13228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digital-sentinel.com\/wp-json\/wp\/v2\/tags?post=13228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}