“Andrew Auernheimer, a controversial computer hacker who looked through the files, used Twitter to publicly identify Adult FriendFinder customers, including a Washington police academy commander, an FAA employee, a California state tax worker and a naval intelligence officer who supposedly tried to cheat on his wife.
Asked why he was doing this, Auernheimer said: “I went straight for government employees because they seem the easiest to shame.”
Millions of others remain unnamed for now, but anyone can open the files – which remain freely available online. That could allow anyone to extort Adult FriendFinder customers.”
— Adult dating site hack exposes sexual secrets - May. 22, 2015 – The breach was carried out by a hacker who goes by the moniker ROR[RG]. In an online hacker forum, he said he blackmailed Adult FriendFinder, telling the site he would expose the data online unless the company paid him $100,000. On the forum, hackers immediately praised ROR[RG], saying they were planning on using the data to attack the victims. “i am loading these up in the mailer now / i will send you some dough from what it makes / thank you!!” wrote a hacker who goes by “MAPS.” FriendFinder Networks Inc., parent company of Adult FriendFinder and other adult sites and publications including Penthouse, said in a statement that it had just become aware of the breach, and it is working closely with law enforcement and cyberforensics company Mandiant, a FireEye (FEYE) subsidiary.