The man whose YouTube video went viral when he surprised his expecting wife with her own positive pregnancy test result is trending on the Internet once more. This time, the Christian vlogger is a victim of the Ashley Madison data hack, where he has been exposed as having an account with the dating site infamous for getting married spouses hooked up to have affairs.

Sam Rada and his wife, Nia, uploaded a new video to their YouTube account to address the issue and assure their viewers that not only has Nia forgiven her husband, but God has forgiven him as well.

The couple sits together while Sam addresses the camera to explain that the email address used to create the Ashley Madison account in question was indeed his. However, he insists that he created that account two years ago – long before the couple became an Internet sensation.

Sam also says that the issue between the couple, which caused him to create the account in the first place, has already been resolved. He continues to say that he never met anyone through the website and has never had any extramarital affair.

He then goes on to explain that, as a Christian, he is broken and weak (as are all people according to him) against sinful desires. However, he believes that God has already forgiven him and his conscience is clear of his past weakness and curiousity for the flesh.

Nia joins in with some words of support for her husband and encourages anyone who is going through a rough patch to find ways to resolve their problems and save their marriage – just like she says her own marriage is worth fighting for.

The couple is certainly putting on a strong front with this shocking revelation about their private lives due to the security breach on the user data stored on Ashley Madison.

The couple first gained Internet fame in 2014 when their first videos started becoming popular on YouTube. The couple's account was created in 2007 and Sam's Ashley Madison account was reportedly created in 2013.

Be sure to follow T-Lounge on Twitter and visit our Facebook page.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion