The group responsible for the Ashley Madison hack published the compromised records on Tuesday, delivering on the promise made when the hack was announced in July. The compromised records include account profile information, personal information, financial records, and more.In July, a group calling themselves Impact Team leaked a selection of files that they claimed originated form Avid Life Media (ALM), the company behind adult playgrounds of Ashley Madison, Cougar Life, Established Men, and others.The group said they had fully compromised the company's records, and demanded that they halt operations on Ashley Madison and Established Men. If that didn't happen, the group said they would publish the compromised records in full.The reason for the attack, the group said, is because the company "profits on the pain of others."On Tuesday, they delivered on their promise, and released 35GB of data to the public. Along with links to the leaked data, the group published the following:"Avid Life Media has failed to take down Ashley Madison and Established Men. We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data.Find someone you know in here? Keep in mind the site is a scam with thousands of fake female profiles. See ashley madison fake profile lawsuit; 90-95% of actual users are male. Chances are your man signed up on the world\u2019s biggest affair site, but never had one. He just tried to. If that distinction matters.Find yourself in here? It was ALM that failed you and lied to you. Prosecute them and claim damages. Then move on with your life. Learn your lesson and make amends. Embarrassing now, but you\u2019ll get over it."The group also published a key so that anyone downloading them would know they came from the proper source.The leaked files include databases complete with account information, profile data, PII, and financial data. The email database alone contains 36 million records. Among those records are 15,019 accounts using either a .mil or .gov email address. Other records indicate that the user created their ALM profile with a work related email address.On Twitter, @t0x0 provided Salted Hash with a breakdown of these addresses. A brief example is below; the image contains a larger list of domains. A full list is available here.us.army.mil - 6788navy.mil - 1665usmc.mil - 809mail.mil - 206gimail.af.mil - 127If the data in the leaked files is valid, then Impact Team has created a blackmail archive that could land scores of people in hot water.However, ALM never required that data be valid unless the user registered for a paid account, and even then the verification process wasn't that hard to bypass as long as the bills were paid.Clearly there are plenty of false records, including those from the White House, or yahoo.gov. However, the records with full account details, including profiles matched to personal and financial records, are going to be harder to dispute.This story is developing, and will be updated as new information becomes available.--Update (20\/08\/2015):Late last night, Impact Team released another archive of data. This time, it's almost twice the size of the previous archive, coming in at 18.5GB.The archive was published along with a signed note (using the PGP Key published earlier to verify the files released by the group) telling the ALM CEO, Noel Biderman, that it was okay to admit the leaked files were real.Previously, ALM's CEO had claimed that the files pouring onto the Web this week couldn't be verified, and in some cases fake.It isn't completely clear what the files are, but based on the folder names, one is clearly Biderman's email spool, while the others appear to be department related.