IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Analysis

John McAfee: Ashley Madison hack was 'lone female employee'

Antivirus tycoon points to evocative language and "sources within the Dark Web"

A woman working for the parent company of Ashley Madison was responsible for last month's hackthat resulted in the leak of 33 million customer details online, according to veteran cybersecurity figure John McAfee.

Writing for International Business Times, McAfee yesterday claimed that the leak was engineered by "a woman operating on her own who worked for Avid Life Media", which owns the infidelity dating site, rather thanbeing the work of external actors,.

He claimed the Impact Team hacking group that has claimed responsibility for the attack is a fabrication, citing "reliable sources within the Dark Web". His primary reasoning is that, unlike hacker collectives Lizard Squad and Lulzsec, Impact Team has not been linked to any prior breaches.

Instead, he alleged that a single insider was responsible, writing: "From the data that was released, it was clear that the perpetrator had intimate knowledge of the technology stack of the company (all the programs being used).

"For example, the data contains actual MySQL database dumps. This is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target."

He added that information he provided to IBTimes which is to be "referenced and then destroyed" proves this.

McAfee supposedly deduced the gender of the mole through evocative statements attached to the initial breach.

"The most telling was a statement calling men 'scumbags'," he said. "In a separate section, the perpetrator describes men as cheating dirtbags. I think in any language this would suggest that a woman is speaking."

The controversial cybersecurity expert pointed to sensitive details exposed in the leak to claim it was an inside job.

"The personnel work scheduling for equipment maintenance will normally exist only on the workstation of the maintenance manager", McAfee wrote.

"Likewise, the data for options for stock shares in a company, an extremely private set of data, will exist only in a private file on the workstation of the VP of Finance, or the CEO."

McAfee believes that the sheer amount of information, most of it kept in separate directories, is evidence of an internal actor, and states that "only someone on the inside, who could easily gain all of the files through deception and guile, could have done the job."

However, independent computer analystGraham Cluley, was less than convinced about McAfee's conclusions.

He told IT Pro:"Once again, John McAfee is doing a great job of drawing attention to himself. If he has any genuine evidence then he should pass it over to the police."

"I suspect they have enough serious leads to explore already without every amateur Miss Marple spouting off with their own theories," he added.

Mark James, IT security specialist at ESET, was more charitably disposed towards the idea, saying: "The claims are quite feasible because often in the case of large data breaches there is indeed help from the inside.It's the easiest way to get malware onto the internal systems or data extracted from the servers."

But malware intelligence analyst at MalwareBytes, Chris Boyd, suggested that hackers may have purposefully misled experts to disguise their identities.

"While McAfee's claims of insider activity are interesting, it's not a huge leap to think that anybody wanting to false flag themselves out of the equation would simply attempt to come off sounding like something they're not," he said.

"It might be a woman - or it might be a man going out of their way to throw people off the scent. I don't think it really matters either way - man or woman, the data is out there, and the damage is done."

The 10GB data dump released on the dark web last week has already caused casualties, with Toronto police claiming two people have committed suicide as a result, while others have been blackmailed by cybercriminals.

Lawsuits have also emerged, with a Californian man suing Avid Life Media for negligence.

Featured Resources

2022 State of the multi-cloud report

What are the biggest multi-cloud motivations for decision-makers, and what are the leading challenges

Free Download

The Total Economic Impact™ of IBM robotic process automation

Cost savings and business benefits enabled by robotic process automation

Free Download

Multi-cloud data integration for data leaders

A holistic data-fabric approach to multi-cloud integration

Free Download

MLOps and trustworthy AI for data leaders

A data fabric approach to MLOps and trustworthy AI

Free Download

Recommended

Ten ways to protect your company from the next big data breach
data breaches

Ten ways to protect your company from the next big data breach

18 Feb 2022
Gumtree site code made personal data of users and sellers publicly accessible
data protection

Gumtree site code made personal data of users and sellers publicly accessible

16 Dec 2021

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

14 Nov 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

15 Nov 2022
Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation
cyber crime

Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation

25 Nov 2022