TORONTO (Reuters) - Emails sent by the founder of infidelity website AshleyMadison.com appear to have been exposed in a second, larger release of data stolen from its parent company, cyber security experts confirmed on Thursday.
The data dump by hackers who have attacked the site appears to include email messages linked to Noel Biderman, founder and chief executive officer of its Toronto-based parent company Avid Life Media.
In a message accompanying the release, the hackers said: “Hey Noel, you can admit it’s real now.”
That appeared to be a riposte to the company’s initial response to Tuesday’s dump that the data may not be authentic.
The earlier dump exposed millions of email addresses for customers of Ashley Madison - whose tagline is ‘Life is short. Have an affair.’ - including for U.S. government officials, UK civil servants and high-level executives at European and North America corporations.
The U.S Defense Department and Postal Service are also investigating the alleged use of military and other government email accounts on the site.
Former reality TV star and family values campaigner Josh Duggar admitting to cheating on his wife after reports he had subscribed to the site.
The hackers object to the site’s business practices, specifically a “paid delete” option that allows people to pay to remove all their information but, they say, does not actually do that.
David Kennedy, founder and security consultant at TrustedSec, said that the fresh release appears to be authentic.
“Everything appears to be legit,” he said in an email. “We have portions downloaded and its confirmed legitimate thus far.”
A report in Vice Media’s online technology site Motherboard, which first reported the new data dump, said the release bore the same fingerprints as Tuesday’s release.
The additional release will likely ratchet up the pressure on Avid Life, which has been quiet about exactly how much and what sort of data was stolen in a breach in July.
The company, which also owns websites CougarLife.com and EstablishedMen.com, did not immediately respond to requests for comment.
“These guys are very diligent about not being caught,” said Erik Cabetas, managing partner of Include Security, who has done forensic work on the initial dump.
The release includes source code for the website as well as smartphone apps and proprietary company data, he added. The availability of the source code could allow other hackers to set up a similar site or find and exploit vulnerabilities on the actual site, which is still operating.
The 20-gigabyte data dump reported on Thursday would be roughly double the size of the earlier one.
Despite the negative publicity surrounding the cyber attack, demand for Ashley Madison’s services has been steady since the data breach first announced in July, said Mark Brooks, CEO of Internet dating consultancy Courtland Brooks.
“I would have thought this would be a death knell for that company because their entire business basis is privacy,” Brooks said. “It just goes to say that all press is good press...The awareness of the brand is through the roof.”
The data release could have severe consequences for U.S. service members. Several tech websites reported that more than 15,000 email addresses were government and military ones.
The Pentagon said it was aware of reports that military email addresses were among those posted earlier in the week.
Defense Secretary Ash Carter told a Pentagon news conference that different service branches were looking into the matter.
“I‘m aware of it. Of course it’s an issue because conduct is very important. We expect good conduct on the part of our people,” Carter said. “The services are looking into it, as well they should be, absolutely.”
The U.S. Postal Service and its internal watchdog also plan to review whether or not some of the agency’s employees may have violated federal policies by using their government email on the infidelity website.
Additional reporting by Jeffrey Dastin in New York and David Alexander in Washington; Editing by Grant McCool and Christian Plumb