The hackers taking credit for infiltrating extramarital dating site Ashley Madison say they have much more data, including user pictures, chats and messages.

The group, which goes by the moniker Impact Team, answered questions via email from tech news site Motherboard.

ADVERTISEMENT

The digital vigilantes are on a mission to expose Ashley Madison’s parent company, Avid Life Media (ALM), which they say has been misleading its customers about what data they collected and deleted. They dumped the data on Ashley Madison users only after the company refused to take down the site.

On Friday, Incident Team said it originally cracked ALM’s network “a long time ago.”

Since then, the group has compiled “300GB of employee emails and docs from internal network,” it said, significantly more than it has released to this point. “Tens of thousands of Ashley Madison user pictures. Some Ashley Madison user chats and messages. 1/3 of pictures are dick pictures and we won't dump. Not dumping most employee emails either. Maybe other executives.”

So far, Incident Team has released personal details and dating profiles, including credit card transaction information, on roughly 36 million people.

In a second dump Thursday, the team also exposed ALM CEO Noel Biderman’s email and information related to Ashley Madison’s website design and development.

The hack has even piqued the interest of government officials.

More than 10,000 apparently legitimate emails with “.gov” or “.mil” endings were included in the initial dump. Further investigations found that hundreds of officials at more than two dozen Obama administration agencies, as well as the House and Senate, were paying members of the service.

Defense Secretary Ashton Carter said Thursday the military services are looking into the leak. Military members can be prosecuted for adultery under Article 134 of the Uniform Code of Military Justice.