BreachExchange mailing list archives

What Happens to your Stolen Data?


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Mon, 1 Dec 2014 18:59:46 -0700

http://www.freshbusinessthinking.com/business_advice.php?CID=0&AID=13757&Title=What+Happens+to+your+Stolen+Data#.VHy4ADHF-So

Despite the wealth of media coverage generated around high-profile attacks
on the likes of Target and eBay in the past year, too many businesses
continue to fail to protect their customers from online criminal abuse.

Indeed, hackers are amplifying their use of email to spread data-theft
malware. With such attacks designed specifically to trick users into
handing over their information or downloading malware onto their machines,
it is unnerving to think about what these nameless, faceless hackers are
doing with the data they make off with.

When an attack is announced, people tend to worry about identity theft and
their bank accounts being illegally accessed. Cue, passwords being changed
and bank statements thoroughly checked. However, with some breaches —
particularly larger ones — cyber criminals will have gained terabytes of
data, all of which they probably won’t use right away. The information they
received is probably just one step in their plan, and there is a
possibility that we’ll see the effects of this year’s attack, months, and
possibly years, from now.

In addition to the ‘valuable’ data stolen, such as credit card details,
cybercriminals also end up with what is called ‘by-product’ data. This
includes data that may not have any value to them, including surnames,
maiden names, date of births, addresses etc. However, this information will
be useful to other criminals who want to target specific people through
spear phishing and social engineering attacks. It then becomes a bit like
stealing a car and selling it for parts. Stolen data is essentially
manipulated to access even more confidential data.
Worryingly, subsequent attacks designed with this data at their core are
invariably much more visually and technically refined and therefore more
successful in duping the user being targeted. They hit their targets
because the email received looks legitimate and has apparently come from a
trusted source. It’s important to remember that well-funded cybercriminals
have the resources, time and energy to create these email replicas and
phony websites.

From a business perspective, given email remains a simple and direct way of
reaching and staying in touch with customers, deploying solutions that
defend customers from cyber attacks of this nature has become more
important than ever. Indeed, losing email as a trusted communication
channel with consumers can have reverberations throughout the business,
especially from a marketing and sales generation perspective.

That said, while we may only seem to hear about big name data breaches, our
personal online behaviour also needs to be reassessed. Consumers must be
vigilant with their data and continue to be on the lookout for emails,
attachments or unofficial pop-up ads that look suspicious. Spear phishing
is simply a 21st Century equivalent of traditional, non-technological
tricks, such as pick-pocketing, therefore the smarter and more street-wise
the user is, the less likely they are to fall victim.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: