Read time: 1 minute

C&L's Late Nite Music Club With AC/DC

What does "Thunderstruck" have to do with the Ashley Madison hack? Well, you're about to find out.

Back on July 12th, if you logged into Ashley Madison, you were greeted by this song blasting out of your computer speakers. However, people have yet to understand why the song was used by the hackers other than that some of the lyrics vaguely describe someone who is in trouble for doing something they shouldn't be. Regardless, there's a little more to this than the song. Even though I personally think cheating is a crappy thing to do, this hack is a pretty big step back for net neutrality and there are a lot of innocent people caught in the crossfire in terms of massive leak of personal information (e.g. happily married swingers). All in all, sneaking around on your spouse is still terrible, but you've got to take a few more things into account before you take aim at one of the biggest infidelity sites out there. Ashley Madison has had a lot of responses to the hack around the web, but what I find a bit more interesting is what the hackers had to say about their motives, which goes much further than a moral stance on cheating.

You can read what they have to say here:

What are you listening to tonight?

Have you subscribed yet?

Banish those ads for good with a subscription to the site. For $1 for the first month and $4.99 after that, we'll pull all the ads off (except those from 3rd party apps) so you can enjoy the site without all the annoying popups and autoplay ads.

If you've already subscribed, consider a one-time or donation of whatever amount you can spare. It will be greatly appreciated and help us continue our mission of exposing the real FAKE NEWS!

More C&L Coverage


We welcome relevant, respectful comments. Any comments that are sexist or in any other way deemed hateful by our staff will be deleted and constitute grounds for a ban from posting on the site. Please refer to our Terms of Service (revised 3/17/2016) for information on our posting policy.