DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Blackmailers Demand Bitcoin from Ashley Madison Users

Posted on August 21, 2015 by Dissent

Stan Higgins reports:

An American has received a blackmail email demanding payment in bitcoin after user data from the extramarital affair platform Ashley Madison was leaked.

The email, provided to CoinDesk and dated 20th August, was sent by an entity calling itself “Team GrayFlay” and contained the individual’s name and personal address. The user was instructed to send a payment in bitcoin or face exposure.

[…]

“Unfortunately your data was leaked in the recent hacking of Ashley Madison and I now have your information. If you would like to prevent me from finding and sharing this information with your significant other send exactly 2.00000054 bitcoins (approx. Value $450 USD) to the following address…”

Read more on CoinDesk.  The same blackmail threat was also received by an individual in New Zealand, as Stuff reports.

Related posts:

  • U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud
Category: Business SectorNon-U.S.

Post navigation

← Toronto-area lawyers file class action over Ashley Madison breach
Anonymous Hacks South African Government Contractor for #OpMonsanto →

2 thoughts on “Blackmailers Demand Bitcoin from Ashley Madison Users”

  1. Anonymous says:
    August 21, 2015 at 7:34 am

    I’m glad there isn’t any types of harm.

  2. IA Eng says:
    August 21, 2015 at 9:13 am

    And when they pay…. They are now marked as a live one, and this hacker ends up selling the persons email to another who will try the exact same thing.

    Since the website doesn’t have any email verification, all one has to do is say, someone signed them up for the AM account, and then here came the blackmail.

    Don’t answer the emails…. then they have NO idea whether the account is alive or dead.

    When you combine TOO MUCH personal information in social media sites, a crook can tie all of this together and make your life even more miserable.

    Making a big deal out of the incoming emails WILL make a big deal in real life. Ignore them. Don’t even open an email up from people you do not know. They can imbed a photo or other symbol in the email. Then all they have to do is to look to see which potential victims have opened up the emails, and will use the scare tactic to send follow up emails.

    Make sure your PREVIEW Pane for messages is OFF on all folders, as well as returning any request for email receipts. Set up your email to deposit all potential spam into the deleted folder and ensure every time you close the email, the trash is emptied.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.