{"id":18810,"date":"2020-02-22T11:23:41","date_gmt":"2020-02-22T16:23:41","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=18810"},"modified":"2020-02-22T11:23:41","modified_gmt":"2020-02-22T16:23:41","slug":"how-do-hackers-make-money-from-your-stolen-data","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/how-do-hackers-make-money-from-your-stolen-data\/","title":{"rendered":"How do hackers make money from your stolen data?"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 26pt;\">How Much is Your Data Worth?<\/span><\/strong><\/p>\n<p><em><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The following article was written by Jareth from Emsisoft. It first appeared on the Emsisoft blog on February 20, 2020.\u00a0<\/span><\/em><\/p>\n<p><em><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Everyone who uses the Internet (and that&#8217;s just about all of us) will find the content of this article informative as well as shocking. Most of us have no idea how much our personal and semi-personal data is worth to cybercriminals and their ilk.<\/span><\/em><\/p>\n<p><em><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">A BIG THANK YOU to Emsisoft for giving us permission to share this article with you. We hope you learn as much from it as we did.<\/span><\/em><\/p>\n<hr \/>\n<hr \/>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 26pt;\">How do hackers make money from your stolen data?<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Cybercriminals will go to great lengths to steal your data \u2013 but what do they actually do with your information once they get their hands on it?<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In most cases, data theft is financially driven. After stealing your information, bad actors can use a variety of shady channels to monetize your data, including taking out loans and making purchases under your name, holding your data to ransom and selling your data on dark web marketplaces to the highest bidder.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In this article, we\u2019ll show you exactly how hackers steal and monetize your data, and how much it sells for on the black market.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">How hackers steal your data<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There are many methods hackers can use to steal your data. The following is not an exhaustive list, but it does include some of the most common techniques:<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">1. Malware<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">There are many types of malware that can be used to steal your personal information, including keyloggers, info stealers, banking malware and more.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Most strains typically focus on login credentials, credit card information, browser autofill data and cryptocurrency wallets. Certain breeds, such as the infamous Vega Stealer, sniff out specific file types such as PDF, Word, Excel and text files and exfiltrate (transfer the data without authorization) them to a remote command and control server.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Malware typically spreads via malicious email attachments, malvertising, drive-by downloads and pirated software. You can keep your system safe from malware with a proven antivirus solution like\u00a0<a href=\"https:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Emsisoft Anti-Malware<\/a>&#8230;<\/span><\/p>\n<div class=\"accent-block-wrapper\" data-accent-id=\"download-now-emsisoft-anti-malware-free-trial-cta-try-it-now\" data-accent-index=\"7\">\n<div class=\"post__content-accent-block type-1\">\n<div class=\"post__content-accent-block-content\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><strong>2. Phishing<\/strong><\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Phishing is a form of low-tech social engineering in which cybercriminals attempt to extract sensitive information such as login credentials, credit card information and personally identifiable information (PII).<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In a\u00a0typical phishing scam, attackers pose as a reputable company such as Microsoft, Amazon or Netflix and claim there\u2019s an issue with your account. The message encourages you to click on a link where you can supposedly resolve the issue by confirming your password or entering your credit card information. This data is sent directly to the hackers, who can then gain access to your real account and the information stored within.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Phishing attacks are typically delivered via email, but they can also be implemented through social media, text messages and phone calls.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">3. Weak passwords<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Hackers can also steal your data by cracking the passwords of your online accounts. There are a few ways this can be accomplished:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Password leaks<\/strong>: When major service providers are hacked, it often results in millions of passwords being leaked, which may be sold or dumped on the web for all to see. Because so many people use the same password for multiple services, attackers can simply use the leaked login credentials to try to gain access to the users\u2019 other accounts. You can check if one of your accounts has been involved in a leak by entering your email address at\u00a0Have I Been Pwned**.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Brute force attacks<\/strong>: Hackers use purpose-made tools to input every possible combination of characters until the correct password is guessed. The shorter and weaker the password, the quicker it will be cracked by a brute force attack.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Keyloggers<\/strong>: Attackers use data-stealing malware such as keyloggers to track keyboard input data and steal your passwords.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Phishing<\/strong>: Hackers use social engineering to get you to willingly divulge your username and password. Phishing attacks can appear very convincing and may be sent from a legitimate account that has been compromised.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Post-exploitation tools<\/strong>: Some tools are made to harvest passwords and other valuable information stored on systems that have already been compromised. If your system has been compromised (e.g. by malware), an attacker can deploy post-exploitation tools like the infamous Mimikatz to view and steal login credentials that are stored deep within your system&#8230;<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">4. Unsecured connections<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Attackers can also steal your data by preying on unsecured connections such as public Wi-Fi networks.\u00a0<a href=\"https:\/\/blog.emsisoft.com\/en\/22660\/public-wi-fi-is-it-safe\/\" target=\"_blank\" rel=\"noopener noreferrer\">Public Wi-Fi is often unsecured and unencrypted<\/a>, leaving users vulnerable to a variety of attacks, including:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Man-in-the-middle attacks<\/strong>: Hackers intercept your data by positioning themselves in the middle of your connection to the public Wi-Fi. Attackers can access any information that passes between you and the websites you visit while connected to the Wi-Fi network, including your passwords and financial data.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><strong>Rogue hotspot<\/strong>: Attackers set up a Wi-Fi access point that resembles a legitimate hotspot, enabling them to eavesdrop on network traffic. Attacks may also be able to use the rogue hotspot to distribute malware or direct you to malicious websites.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">How hackers monetize stolen data<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Once a hacker has successfully stolen your data, the first step is to inventory it. They comb through your data for valuable information such as your login credentials, financial information, names, phone numbers, addresses and social security number, and organize it in a database. After the data has been collated, hackers have a variety of ways to monetize it.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Use the data themselves<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In some cases, hackers may monetize your stolen data by using it themselves to make purchases or commit fraud. This is relatively rare as committing fraud is much more likely to attract the attention of authorities than anonymously selling large batches of data online. Nevertheless, it does happen.<\/span><\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Attackers can use your stolen data to:<\/span><\/strong><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Purchase items online<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Extract money from your bank account<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Apply for bank loans<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Apply for credit cards<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Make fraudulent health insurance claims<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Pay off debt<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Request money from your contacts using your email and social media accounts<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Sell your login credentials<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Usernames and passwords are often sold in bulk on the dark web. Buyers may use your login credentials to transfer money from your bank account, make online purchases and access various paid services.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Here\u2019s how much your account credentials typically sell for, according to a\u00a0<a href=\"https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-24-2019-en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Symantec report<\/a>\u00a0on the underground economy:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Gaming platform accounts: $0.50-$12<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Video and music streaming accounts: $0.10-$2<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Cloud service accounts: $5-$10<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Online banking accounts: 0.5%-10% of the account\u2019s value<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Sell PII to buyers on the black market<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Hackers commonly sell PII on underground marketplaces that are accessible on the dark web. Typically, PII will be sold in bulk batches. The more recently the data has been stolen, the more valuable it is.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Here\u2019s how much your data is worth:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Name, social security number and date of birth: $0.10-$1.50<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Medical notes and prescriptions: $15-$20<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">ID\/passport scans or templates: $1-$35<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Mobile phone online account: $15-$25<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Full ID packages (name, address, phone, SSN, email, bank account): $30-$100.<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It might not sound like a lot of money, but it\u2019s important to remember that data is often sold in enormous batches. Attackers who are able to successfully breach a major company can sometimes walk away with the data of millions of users, which can collectively be sold for big bucks. In 2019, the hacker behind the\u00a0<a href=\"https:\/\/www.zdnet.com\/article\/australian-tech-unicorn-canva-suffers-security-breach\/?utm_source=emsisoft\" target=\"_blank\" rel=\"noopener noreferrer\">Canva data breach<\/a>\u00a0put up for sale on the dark web the data of 932 million users, which he stole from 44 companies.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Sell your credit card information<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Attackers will usually sell your credit card information in large bundles of hundreds or even thousands of stolen credit cards. This data is often purchased by \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Carding_(fraud)\" target=\"_blank\" rel=\"noopener noreferrer\">carders<\/a>\u201d, who try to avoid fraud detection by purchasing gift cards and using them to buy physical items, which may then be sold on the dark web as well as through legitimate channels such as eBay or Craigslist.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">How much do hackers sell your credit card information for?<\/span><\/p>\n<ul>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Single credit card: $0.50-$20<\/span><\/li>\n<li><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Single credit with full details: $1-$45<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Hold your data to ransom<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Some types of\u00a0ransomware have data exfiltration functionality, which enables hackers to not only encrypt your data but also steal it via a range of channels, including FTP, HTTP, HTTPS, SSL\/TLS and more.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Attackers can use your stolen data as extra leverage to encourage you to pay the ransom (the average is\u00a0a whopping $84,000) and sell your PII on the black market for extra pocket money.<\/span><\/p>\n<h3><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Sell valuable intellectual property<\/span><\/h3>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">It\u2019s not uncommon for hackers to launch attacks on large corporations and sell the stolen data to companies in developing nations. These are typically highly sophisticated, nation-sponsored attacks and can be incredibly lucrative for both the hackers and the country funding the attack. Chinese intellectual property theft is estimated to\u00a0<a href=\"https:\/\/ustr.gov\/about-us\/policy-offices\/press-office\/fact-sheets\/2018\/march\/section-301-fact-sheet\" target=\"_blank\" rel=\"noopener noreferrer\">cost the U.S. economy $50 billion a year<\/a>.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">How data theft can impact victims<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Being the victim of data theft can have significant repercussions. In the short-term, you\u2019ll have to go through the time-consuming process of securing your compromised accounts, reversing fraudulent purchases and replacing stolen credit cards.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">These are annoying but not life-changing effects. However, there can also be longer-lasting consequences.<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">For example, if your social security number is stolen and used for fraudulent activity, it could potentially impact your credit history and credit score. Undoing the damage can be very difficult, and may prevent you from making loan applications, purchasing a home or renting property. In addition, if your work-related accounts are used to deliver malware or phishing attacks, you may damage your professional reputation, cause business loss or have to face disciplinary action from superiors.<\/span><\/p>\n<h2><span style=\"font-family: helvetica, arial, sans-serif; font-size: 24pt;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Data theft is usually financially driven. There are many ways for cybercriminals to get their hands on your personal data, including malware, phishing, password cracking and man-in-the-middle attacks. Once they have obtained your data, they may use it themselves to commit fraud, or they may sell it in bulk on the dark web.<\/span><\/p>\n<p>&nbsp;<\/p>\n<section class=\"authorbox container is-slim\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"avatar avatar-127 photo authorbox__image alignleft\" src=\"https:\/\/secure.gravatar.com\/avatar\/9fd02f7724fb6f6ab41edea2d82942b5?s=127&amp;d=mm&amp;r=g\" srcset=\"https:\/\/secure.gravatar.com\/avatar\/9fd02f7724fb6f6ab41edea2d82942b5?s=254&amp;d=mm&amp;r=g 2x\" alt=\"Jareth\" width=\"127\" height=\"127\" \/><\/span><\/p>\n<div class=\"authorbox__body\">\n<h3 class=\"authorbox__name\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/blog.emsisoft.com\/en\/author\/jareth\/\">Jareth<\/a><\/span><\/h3>\n<p class=\"authorbox__description\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">Writer. A picture is worth a thousand words but unfortunately I can&#8217;t draw. The world of IT security has always fascinated me and I love playing a small role in helping the good guys combat malware.<\/span><\/p>\n<hr \/>\n<p>**\u00a0 <span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">NOTE:\u00a0 Cloudeight we no longer considers <strong>Have I Been Pwned<\/strong> a totally credible source. It should be used with the understanding that an email address found on the Dark Web is not necessarily a sign that your personal dat is also on the DarkWeb. Email addresses have been harvested and sold for two decades, but an email address is not considered personal information.\u00a0<\/span><\/p>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; How Much is Your Data Worth? The following article was written by Jareth from Emsisoft. It first appeared on the Emsisoft blog on February 20, 2020.\u00a0 Everyone who uses the Internet (and that&#8217;s just about all of us) will find the content of this article informative as well as shocking. Most of us have no idea\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/how-do-hackers-make-money-from-your-stolen-data\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":14573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1678,1670],"tags":[1293,3815,1749,3813,3814],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18810"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=18810"}],"version-history":[{"count":7,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18810\/revisions"}],"predecessor-version":[{"id":18817,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/18810\/revisions\/18817"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/14573"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=18810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=18810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=18810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}