{"id":9912,"date":"2015-09-02T00:35:00","date_gmt":"2015-09-02T06:35:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/ashley-madison-breach-shows-ugly-side-of-hacking\/"},"modified":"2025-01-10T08:36:36","modified_gmt":"2025-01-10T15:36:36","slug":"%ec%95%a0%ec%8a%90%eb%a6%ac-%eb%a7%a4%eb%94%94%ec%8a%a8-%eb%8d%b0%ec%9d%b4%ed%84%b0-%ec%9c%a0%ec%b6%9c-%ec%82%ac%ea%b1%b4%ec%9d%80-%ed%95%b4%ed%82%b9%ec%9d%98-%ec%b6%94%ec%95%85%ed%95%9c-%eb%a9%b4","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/","title":{"rendered":"\uc560\uc290\ub9ac \ub9e4\ub514\uc2a8 \ud574\ud0b9 \uc0ac\uac74\uc740 \ud574\ud0b9\uc758 \ucd94\uc545\ud55c \uba74\uc744 \ub4dc\ub7ec\ub0c8\ub2e4"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Hands drafting technical diagrams between open laptops, the monochrome scene feeling tense and quietly ominous.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach-300x186.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach-1024x636.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach-768x477.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2015-09-02T00:35:00-06:00\">9\uc6d4 2, 2015<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Ashley Madison breach shows ugly side of hacking<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Ashley%20Madison%20breach%20shows%20ugly%20side%20of%20hacking').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fashley-madison-breach-shows-ugly-side-of-hacking%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Ashley%20Madison%20breach%20shows%20ugly%20side%20of%20hacking&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fashley-madison-breach-shows-ugly-side-of-hacking%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fashley-madison-breach-shows-ugly-side-of-hacking%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fashley-madison-breach-shows-ugly-side-of-hacking%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2><\/h2>\n<p>Hacks of retailers like Target and Home Depot caught the public\u2019s attention and data breaches of financial institutions like J.P. Morgan were further reason for concern. More recently, breaches of government agencies\u2014like the <a href=\"\/fallout-continues-in-opm-breach-as-damage-proves-worse-than-originally-thought\/\">Office of Personnel Management<\/a>\u2014have served as a further wake-up call as to just how serious a threat cyber attacks are to the public\u2019s privacy and safety.<\/p>\n<p>A more recent hack of the website Ashley Madison\u2014an online dating service that targets married people or individuals in committed relationships interested in having an affair\u2014have exposed just how ugly hacking can get. A hacker group calling itself the Impact Team has claimed credit for stealing the details of <a href=\"http:\/\/www.zdnet.com\/article\/impact-team-ashley-madison-blackmailed-users-not-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">38 million<\/a> Ashley Madison users. The group threatened Ashley Madison\u2019s parent company, Avid Life Media, saying it would release the information if the site was not shut down. Avid Life Media refused and the hacker group made good on its promise.<\/p>\n<p>The Impact Team cited rampant corruption as its primary reason for targeting Ashley Madison, also claiming that the site was essentially profiting off others\u2019 pain and that it had even become an avenue for human trafficking. The group compared Avid Life Media to a drug dealer feeding narcotics to addicted users.<\/p>\n<p>The aftermath of this particular hack has been extremely messy. Celebrities have been caught up in scandals as a result of having their information leaked and reports of marriages and families breaking up over <a href=\"http:\/\/money.cnn.com\/2015\/08\/21\/technology\/ashley-madison-ruined-lives\/\" target=\"_blank\" rel=\"noreferrer noopener\">cheating revelations<\/a> are beginning to pour out as well, as information had been made easily searchable online. Stories are even starting to surface that Ashley Madison customers who had their information leaked have <a href=\"http:\/\/www.bbc.com\/news\/technology-34044506\" target=\"_blank\" rel=\"noreferrer noopener\">taken their own lives<\/a>, adding an additional tragic element to the story.<\/p>\n<p>Predictably, there has also been a chorus of people making it clear that they believe that the customers exposed in the Avid Life Media hack don\u2019t deserve sympathy because many were deceiving their partners and families by patronizing the site. Regardless of your opinion on the incident, however, the Ashley Madison hack is illustrating the emotional and psychological damage hackers can do. Often times the impact of data breaches is measured by the amount of money or hours of productivity it costs a business; but the effect these events can have on people\u2019s lives is also profound.<\/p>\n<p>What other lessons can be learned from this data breach? If the Impact Team is to be believed, Ashley Madison was another in a long line of organizations that, despite what may have been good intentions to protect sensitive information, was using antiquated or incomplete security solutions. In fact, in an interview, the group claimed that Avid Life Media\u2019s security was \u201cBad\u201d and that the \u201cOnly thing [it had] was [a] segmented network.\u201d<\/p>\n<p>Unfortunately, each new large-scale hack and data breach seems to shine a light on potential consequences of these events. And considering the <a href=\"\/10-facts-every-cyber-security-professional-should-know\/\">increasing number<\/a> and complexity of threats organizations are facing today it is rapidly becoming imperative that these organizations adopt well-rounded security strategies that include threat detection solutions; threat intelligence tools; automated defense and reporting capabilities; and incident response platforms among other products.<\/p>\n<p>If you are concerned that your organization may be vulnerable to an attack and you would like to learn more about how a new approach to security could help you close these loops, <a href=\"http:\/\/www.networkworld.com\/article\/2932283\/network-security\/closing-the-security-loop-with-automated-incident-response.html\" target=\"_blank\" rel=\"noreferrer noopener\">read this story<\/a>.<\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/research\/'><span class='tag-content'>Research<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d28354269cb bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/student-hacking-a-threat-but-a-bigger-opportunity\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\uc6d4 10, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Student hacking: A threat, but a bigger opportunity<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d2835427e37 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/cyber-security-talent-gap-extends-to-state-governments\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\uc6d4 25, 2015<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>New report shows dire cybersecurity talent gap extends to state governments<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d2835428fab bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/the-3-scariest-breach-consequences-for-cios\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>4\uc6d4 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Three Scariest Breach Consequences for CISOs<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"h-interested-in-learning-more\">Interested in Learning More?<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<p class=\"has-white-color has-text-color\">Subscribe today to stay informed and get regular updates from Swimlane.<\/p>\n\n\n\n\n<div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2022\/11\/newsletter-bg.svg' class='img-fluid'   alt='Modern SecOps background: A gradient geometric graphic representing fluid data flow and cloud-native agility.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1042\"><\/form>\n<script>\n    var embeddedFormId = '5b371f4d0405e451c20535f8f66c5f8427779d2a';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1042';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1042\"><\/div>\n<!-- Incluing form response options -->\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":9913,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[86],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9912","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-research","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ashley Madison breach reveals ugly side of hacking<\/title>\n<meta name=\"description\" content=\"A recent hack of the website Ashley Madison has exposed just how ugly hacking can get and the hacker group that claimed credit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc560\uc290\ub9ac-\ub9e4\ub514\uc2a8-\ub370\uc774\ud130-\uc720\ucd9c-\uc0ac\uac74\uc740-\ud574\ud0b9\uc758-\ucd94\uc545\ud55c-\uba74\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ashley Madison breach shows ugly side of hacking\" \/>\n<meta property=\"og:description\" content=\"A recent hack of the website Ashley Madison has exposed just how ugly hacking can get and the hacker group that claimed credit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc560\uc290\ub9ac-\ub9e4\ub514\uc2a8-\ub370\uc774\ud130-\uc720\ucd9c-\uc0ac\uac74\uc740-\ud574\ud0b9\uc758-\ucd94\uc545\ud55c-\uba74\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-10T15:36:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach-1024x636.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"3\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/\",\"name\":\"Ashley Madison breach reveals ugly side of hacking\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png\",\"datePublished\":\"2015-09-02T06:35:00+00:00\",\"dateModified\":\"2025-01-10T15:36:36+00:00\",\"description\":\"A recent hack of the website Ashley Madison has exposed just how ugly hacking can get and the hacker group that claimed credit.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png\",\"width\":1120,\"height\":696,\"caption\":\"Hands drafting technical diagrams between open laptops, the monochrome scene feeling tense and quietly ominous.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ashley Madison breach shows ugly side of hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc560\uc290\ub9ac \ub9e4\ub514\uc2a8 \ud574\ud0b9 \uc0ac\uac74\uc740 \ud574\ud0b9\uc758 \ucd94\uc545\ud55c \uba74\uc744 \ub4dc\ub7ec\ub0c8\ub2e4","description":"\ucd5c\uadfc \uc560\uc290\ub9ac \ub9e4\ub514\uc2a8 \uc6f9\uc0ac\uc774\ud2b8 \ud574\ud0b9 \uc0ac\uac74\uc740 \ud574\ud0b9\uc774 \uc5bc\ub9c8\ub098 \ucd94\uc545\ud560 \uc218 \uc788\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc774\ubc88 \ud574\ud0b9\uc744 \uc790\ud589\ud55c \ud574\ucee4 \uc9d1\ub2e8\uc774 \ub204\uad6c\uc778\uc9c0\ub97c \ub4dc\ub7ec\ub0c8\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc560\uc290\ub9ac-\ub9e4\ub514\uc2a8-\ub370\uc774\ud130-\uc720\ucd9c-\uc0ac\uac74\uc740-\ud574\ud0b9\uc758-\ucd94\uc545\ud55c-\uba74\/","og_locale":"ko_KR","og_type":"article","og_title":"Ashley Madison breach shows ugly side of hacking","og_description":"A recent hack of the website Ashley Madison has exposed just how ugly hacking can get and the hacker group that claimed credit.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\uc560\uc290\ub9ac-\ub9e4\ub514\uc2a8-\ub370\uc774\ud130-\uc720\ucd9c-\uc0ac\uac74\uc740-\ud574\ud0b9\uc758-\ucd94\uc545\ud55c-\uba74\/","og_site_name":"AI Security Automation","article_modified_time":"2025-01-10T15:36:36+00:00","og_image":[{"width":1024,"height":636,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach-1024x636.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"3\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/","url":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/","name":"\uc560\uc290\ub9ac \ub9e4\ub514\uc2a8 \ud574\ud0b9 \uc0ac\uac74\uc740 \ud574\ud0b9\uc758 \ucd94\uc545\ud55c \uba74\uc744 \ub4dc\ub7ec\ub0c8\ub2e4","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png","datePublished":"2015-09-02T06:35:00+00:00","dateModified":"2025-01-10T15:36:36+00:00","description":"\ucd5c\uadfc \uc560\uc290\ub9ac \ub9e4\ub514\uc2a8 \uc6f9\uc0ac\uc774\ud2b8 \ud574\ud0b9 \uc0ac\uac74\uc740 \ud574\ud0b9\uc774 \uc5bc\ub9c8\ub098 \ucd94\uc545\ud560 \uc218 \uc788\ub294\uc9c0, \uadf8\ub9ac\uace0 \uc774\ubc88 \ud574\ud0b9\uc744 \uc790\ud589\ud55c \ud574\ucee4 \uc9d1\ub2e8\uc774 \ub204\uad6c\uc778\uc9c0\ub97c \ub4dc\ub7ec\ub0c8\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/2015-ashley-madison-breach.png","width":1120,"height":696,"caption":"Hands drafting technical diagrams between open laptops, the monochrome scene feeling tense and quietly ominous."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/ashley-madison-breach-shows-ugly-side-of-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Ashley Madison breach shows ugly side of hacking"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9912\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9913"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9912"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9912"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9912"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9912"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9912"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}