What do criminals do with my data?
The danger of data breach
Stolen data typically ends up on the Dark Web. As the name implies, the Dark Web is the part of the Internet most people never see.
The Dark Web is not indexed by search engines and you need a special kind of browser called Tor Browser to see it. So what’s with
the cloak and dagger? For the most part, criminals use the Dark Web to traffic various illegal goods. These Dark Web marketplaces
look and feel a lot like your typical online shopping site, but the familiarity of the user experience belies the illicit nature
of what’s on offer. Cybercriminals are buying and selling illegal drugs, guns, pornography, and your personal data. Marketplaces
that specialize in large batches of personal information gathered from various data breaches are known, in criminal parlance, as
dump shops.
The largest known assemblage of stolen data found online, all 87GBs of it, was discovered in January of 2019 by cybersecurity researcher
Troy Hunt, creator of Have I Been Pwned (HIBP), a site that lets you check if your email has been compromised in a data breach. The data,
known as Collection 1, included 773 million emails and 21 million passwords from a hodgepodge of known data breaches. Some 140 million
emails and 10 million passwords, however, were new to HIBP, having not been included in any previously disclosed data breach.
Cybersecurity author and investigative reporter Brian Krebs found, in speaking with the cybercriminal responsible for Collection 1,
that all of the data contained within the data dump is two to three years old—at least.
Is there any value in stale data from an old breach (beyond the .000002 cents per password Collection 1 was selling for)? Yes, quite a bit.
Cybercriminals can use your old login to trick you into thinking your account has been hacked. This con can work as part of a phishing attack or,
as we reported in 2018, a sextortion scam. Sextortion scammers are now sending out emails claiming to have hacked the victim’s webcam and recorded
them while watching porn. To add some legitimacy to the threat, the scammers include login credentials from an old data breach in the emails.
Pro tip: if the scammers actually had video of you, they’d show it to you.
If you reuse passwords across sites, you’re exposing yourself to danger. Cybercriminals can also use your stolen login from one site to hack into your
account on another site in a kind of cyberattack known as credential stuffing. Criminals will use a list of emails, usernames and passwords obtained
from a data breach to send automated login requests to other popular sites in an unending cycle of hacking and stealing and hacking some more.
|