Millions of panicked cheaters and their suspicious spouses have crashed websites claiming to host the "cheat sheet" list of names leaked in the Ashley Madison hack.

Tens of thousands of Ashley Madison account holders in New Zealanders are among the 36 million users whose personal details have been leaked online.

Several searchable databases of names, emails and sexual fantasies linked to the 9.7 gigabyte data leak had to shut down within minutes of going live because they could not cope with demand.

Data from the hack has even been mapped, revealing the popularity of the site in different towns and cities across the world. Users of a data map plotted by CartoDB can see how many people in their area allegedly have accounts with the adultery site (see map below).

Advertisement

It comes as a second, even bigger, "cheat sheet" exposing the users of adultery website has been released. The hackers responsible for the first dump, The Impact team, released another mine of documents and confidential information, according to Vice.

The new documents were dumped with a taunting message to the adultery website's founder as exposed users began to publicly admit their involvement. "Hey Noel, you can admit it's real now," read the post - presumably directed at the company's millionaire CEO Noel Biderman, who has refused to admit the material is all legitimate.

The new - even bigger - 20GB release will do little to calm the nerves of the cheaters whose personal details have been exposed.

It comes as lists of email addresses - purporting to show registered users of the adultery site - have been shared across the web and in the controversial forum 4chan - without any evidence or means of validation.

READ MORE: Ashley Madison hack claims first celebrity

Sony, Boeing, the Bank of America and the United Nations are among those institutions whose domain names appear in the long lists of alleged users.

People are being warned not to use sites that demand a slew of personal details before offering them access to the database because they may be later blackmailed. Genuine users fear their cheating will be discovered after all their details and sexual fantasies were published.

Impact Squad posted the first 9.7 gigabyte file called "Time's Up!" on the dark web because they are "cheating dirtbags" who "do not deserve anonymity".

Lawyers have said Ashley Madison could be sued by millions of outed members.

Data protection specialist Paula Barrett believes there may be a rush for 'no-win no fee' cases as firms rush to cash in on the shame.

She told the Financial Times: "It would not surprise me if people came forward to bring claims against Ashley Madison."

Those who had accounts set up maliciously by enemies and may also have grounds to sue.

While the accuracy of the data is disputed, the map of New Zealand suggests the site is extremely popular with Kiwis.

A quick search of the map by the New Zealand Herald suggest there are:

• 22861 users in Auckland (84 per cent of which are male)
• 11126 in Wellington (85 per cent of which are male)
• 11048 in Christchurch (87 per cent of which are male)
• 4634 in Dunedin (86 per cent of which are male)

In Auckland, the map highlights several suburbs, including Mt Eden (40 users) and Manukau City (6252 users).

According to the map, surfing the controversial site is not confined to city-types.It says there are 61 people using it in Tararua town Pahiatua, 12 in Sanson, 42 in Ohope and 24 in Te Anau.

The map claims to show the location of users of the controversial website based on their IP addresses, which the distribution shows some people could have re-routed.For example, according to the map, the remote Macquarie Island has 12 users even though its population fluctuates between 20 and 40.

Among the alleged Kiwi clients are 32 email accounts linked to government agencies, including a fake email address for Prime Minister John Key.

There were 82 email addresses linked to schools, including one for a principal, and another seven addresses from the New Zealand Defence Force. Other email addresses purport to be linked to Auckland Council, Ministry of Justice, Ministry of Business, Innovation and Employment, Ministry of Social Development, Ministry of Youth Development, Corrections, Department of Conservation, police, and six district health boards.

However, Ashley Madison's sign-up process does not require email account verification.

The data dump also includes other personal information, including postal addresses, individual's sexual preferences, and the last four digits of the credit card used to sign up.

New Zealand IT security consultant and fraud investigator Daniel Ayers has reviewed the data dump material.

He warned spouses and employers to avoid jumping to conclusions. Email addresses provided by people registering with the site could be either wrong, or even deliberately falsified to direct emails from the site to an innocent person "either as a joke or to cause them distress or embarrassment", Mr Ayers said.

The corroboration of credit card details, however, would make it tougher for people to explain.

But while trawling through the New Zealand data, Mr Ayers noticed that many Kiwis had taken the secretive, calculated steps of signing up using a Prezzy Card.

The NZ Post Prezzy Cards can be purchased over the counter using cash, making them virtually untraceable, he said.

Anything purchased with the card leaves the name Prezzy Card Holder. "That name appears on the Ashley Madison data quite frequently," Mr Ayers said.

"That tells us quite a number of people have registered on the site using Prezzy Card with the purposes of protecting their identity which has turned out to be quite prescient because that addresses that issue of the credit cards being the most reliable way of identifying people."

Corrections today confirmed it was investigating allegations that work email addresses have been linked to Ashley Madison accounts.

Deputy chief executive of corporate services Vincent Arbuckle said accessing such a website would be considered inappropriate.

"If any Corrections employee or contractor is found to have breached the IT Acceptable Use Policy, disciplinary action may be taken," he said.

- NZME, Daily Mail and wires