Analysis

John McAfee: Ashley Madison hack was 'lone female employee'

Antivirus tycoon points to evocative language and "sources within the Dark Web"

A woman working for the parent company of Ashley Madison was responsible for last month's hackthat resulted in the leak of 33 million customer details online, according to veteran cybersecurity figure John McAfee.

Writing for International Business Times, McAfee yesterday claimed that the leak was engineered by "a woman operating on her own who worked for Avid Life Media", which owns the infidelity dating site, rather thanbeing the work of external actors,.

He claimed the Impact Team hacking group that has claimed responsibility for the attack is a fabrication, citing "reliable sources within the Dark Web". His primary reasoning is that, unlike hacker collectives Lizard Squad and Lulzsec, Impact Team has not been linked to any prior breaches.

Instead, he alleged that a single insider was responsible, writing: "From the data that was released, it was clear that the perpetrator had intimate knowledge of the technology stack of the company (all the programs being used).

"For example, the data contains actual MySQL database dumps. This is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target."

He added that information he provided to IBTimes which is to be "referenced and then destroyed" proves this.

McAfee supposedly deduced the gender of the mole through evocative statements attached to the initial breach.

"The most telling was a statement calling men 'scumbags'," he said. "In a separate section, the perpetrator describes men as cheating dirtbags. I think in any language this would suggest that a woman is speaking."

The controversial cybersecurity expert pointed to sensitive details exposed in the leak to claim it was an inside job.

"The personnel work scheduling for equipment maintenance will normally exist only on the workstation of the maintenance manager", McAfee wrote.

"Likewise, the data for options for stock shares in a company, an extremely private set of data, will exist only in a private file on the workstation of the VP of Finance, or the CEO."

McAfee believes that the sheer amount of information, most of it kept in separate directories, is evidence of an internal actor, and states that "only someone on the inside, who could easily gain all of the files through deception and guile, could have done the job."

However, independent computer analystGraham Cluley, was less than convinced about McAfee's conclusions.

He told IT Pro:"Once again, John McAfee is doing a great job of drawing attention to himself. If he has any genuine evidence then he should pass it over to the police."

"I suspect they have enough serious leads to explore already without every amateur Miss Marple spouting off with their own theories," he added.

Mark James, IT security specialist at ESET, was more charitably disposed towards the idea, saying: "The claims are quite feasible because often in the case of large data breaches there is indeed help from the inside.It's the easiest way to get malware onto the internal systems or data extracted from the servers."

But malware intelligence analyst at MalwareBytes, Chris Boyd, suggested that hackers may have purposefully misled experts to disguise their identities.

"While McAfee's claims of insider activity are interesting, it's not a huge leap to think that anybody wanting to false flag themselves out of the equation would simply attempt to come off sounding like something they're not," he said.

"It might be a woman - or it might be a man going out of their way to throw people off the scent. I don't think it really matters either way - man or woman, the data is out there, and the damage is done."

The 10GB data dump released on the dark web last week has already caused casualties, with Toronto police claiming two people have committed suicide as a result, while others have been blackmailed by cybercriminals.

Lawsuits have also emerged, with a Californian man suing Avid Life Media for negligence.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Lookout reveals mobile-first endpoint detection and response solution
Security

Lookout reveals mobile-first endpoint detection and response solution

21 Oct 2020
Cisco finds an increase in security concerns due to remote working
Security

Cisco finds an increase in security concerns due to remote working

21 Oct 2020
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
'Robin Hood' hackers donate stolen Bitcoin to charity
ransomware

'Robin Hood' hackers donate stolen Bitcoin to charity

21 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020