Is Ashley Madison Cyber-Attack An Inside Job?
Aug 26, 2015 11:40 AM EDT | By Veronica P. De Leon
In line with the controversial Ashley Madison cyber-attack, security experts believe that the attackers are not some faceless group of hackers. John McAfee, who developed the first controversial antivirus program released a statement revealing who the hackers are.
The antivirus programmer believes that a female worker from the Ashley Madison's parent company called Avid Life Media is also the one responsible for the attack.
McAfee stated that it took him more than one week to analyze the leaked data which point to a female operative. He reasoned that the blame should not be pointed to a group of unknown hackers who are now hiding because they do not exist. The 69-year-old programmer claimed that he even inquired from his sources from the Dark Web.
Base on the analysis of McAfee being exposed in the cyber world himself, he considered many factors before arriving at his conclusion. He looked at the manifesto hints that the perpetrator was a female base on the words used.
An example is the word "scumbags" which was frequently used to address men. The said word is usually used by women to describe men in America. The criminal also addressed men as cheating dirtbags which indicate a woman speaking.
"It was clear that the perpetrator had intimate knowledge of the technology stack of the company (all the programs being used)," he explained. The said observation only means that the attack if from the inside.
"For example, the data contains actual MySQL database dumps. This is not just someone copying a table and making into a .csv file. Hackers rarely have full knowledge of the technology stack of a target," he added.
The exposed information which compromised many users including famous personalities and government officials, are only available to the Ashley Madison workers which supports the assumptions of McAfee.
Being an expert in the field of social engineering, his theory is worthy to be considered in the ongoing operation to determine the hacker. McAfee claims that he was one of the first practitioners of the method which is used by many hackers today.
IT security specialist at ESET Mark James agree with his claims since many cases of data breaches that occurred involved help from the inside because it is the easiest process to infect the system with malwares to extract data.
There are so many ways we can experience exposure to harmful poisons, and in many cases, we may not realize it's happening. From household cleaners and similar products to children's toys, there are often toxins and poisonous products and ingredients lurking in even the most unsuspecting of places.
All pro level athletes know about the dedication needed to not just accomplish their goals, but to achieve even bigger targets in their lives. It's also a commonly known fact that fitness and exercise alone cannot get them there. Putting the right food into their bodies is equally important.
Asian nourishment all in all is substantially more sound than Western cooking. With the absence of dairy fat and added substances, alongside an emphasis on zingy season and crisp fixings, it's anything but difficult to discover solid alternatives on any Asian-propelled menu.
Tired of the conventional three-course meals at wedding receptions? Want something different? Give the menu a twist with our trendy wedding food ideas.
The United Kingdom, which is considered one of the most interesting places in the world. Mainly due to the versatility of its existence and the Union of the countries involved in the empire.
Traveling to new cities is always an exciting adventure. One of the best ways to see a city and try local food is by visiting famous night markets. Night markets are always bustling and full of locals and foreigners trying the delights.