With the growing reliance on digital services, cybercriminals now have more opportunities to target individuals. An estimated 5.9 billion accounts were compromised in data breaches recently.
Although it's concerning to imagine our data being misused, knowing what types of information a cybercriminal seeks and understanding their methods can help us safeguard our assets.
Many cybercriminals don't use the stolen data themselves—they sell it instead. A common marketplace for this is the dark web, where collections of stolen data, sometimes containing millions of records, are sold.
For instance, stolen PayPal account details with a minimum balance of $1,000 can fetch around $20. You can check out this index to see estimated prices for various types of data.
Known as a ransomware attack, cybercriminals gain unauthorised access to an organisation’s system and encrypt crucial data, only returning access after a ransom is paid.
This type of attack has been increasing and significantly impacts the market, with damages exceeding $30 billion in recent years.
By using stolen login credentials like your username and password, cybercriminals can access your online accounts and change the passwords to lock you out.
Hackers can target any kind of account, from social media to Amazon. However, they often aim for accounts that include payment details to exploit your financial information.
Stealing data is often just the first step in a broader strategy.
Some cybercriminals use stolen data to target individuals or organisations with personalised fraudulent emails, making the victim believe they are a trusted source.
‘Whaling’ is a specific type of phishing attack that targets senior executives, potentially offering a large payoff to criminals.
Identity fraud occurs when cybercriminals use someone else's identifiable information for their gain. If a threat actor collects enough data about an individual, they can:
If cybercriminals gain access to your systems, they can connect your IT to a botnet—a network of hacked computers and servers.
This powerful network enables criminals to perform large-scale crimes, such as DDoS attacks, which sabotage a website by overwhelming it with requests, rendering it inoperative.
As servers and storage systems can be expensive, some cybercriminals ‘borrow’ others’ infrastructure.
They attempt to break into your systems to store their data and run applications on your infrastructure, avoiding the costs of their own resources.
Given the high level of cyber risk, it is crucial for both consumers and businesses to protect their personal information.
Here are some key practices to incorporate into your routine:
Understanding the ways cybercriminals exploit data is crucial.
By knowing the types of information they target and their methods of misuse, we can better protect ourselves and our data.
Simple practices like using strong, unique passwords, enabling two-factor authentication, and staying vigilant against phishing attempts can make a significant difference in securing your digital life.
At the end of the day, staying informed and proactive is your best defence against cyber threats. Stay safe and keep your data secure!
5.9 Billion Accounts Compromised in Data Breaches, Tech.co, 2021
Dark Web Price Index, Privacy Affairs, 2022
Ransomware Damages Expected to Exceed $30 Billion, InfoSecurity Magazine, 2023
Sabrina McClune, 18.06.24
Sam Kendall, 18.06.24