Email Security Blog

What happens to personal information when your identity has been stolen?

Agari October 11, 2013 Brand Protection
Fallback Featured Image

Unfortunately, massive data breaches seem to be a growing trend in 2013. Whether they affect 100 people or a million, each one raises the same questions. Aside from the obvious “how are hackers able to access this information?” there are others wondering “what are they doing with my information?”

In general, people worry about identity theft and unauthorized use of financial information once an attack is announced and run around changing passwords and checking credit reports and bank statements. But as you can imagine with some breaches, with millions of users’ data exposed, these cyber criminals most likely had terabytes of data – all of which they probably won’t use right away. The information they received is probably just one step in their plan, and there is a possibility that we’ll see the effects of this year’s attack, months and possibly years from now.

Cyber criminals (wanting to make as much money as possible) will find someone to purchase the data that they consider worthless – we’re talking names of spouses, children and other family members, where they went to school, their hometowns, etc. It’s basically like stealing a car and selling it for parts.

So what do other cyber criminals want with this seemingly worthless information? This information is useful to criminals who want to target specific people through spearphishing and social engineering attacks – manipulation through the use of specific, personal information. For example, a criminal could use your husband’s name, along with your wedding date, to send a ‘happy anniversary’ email that appears to be from your spouse.

While cyber criminals seem to be getting smarter by the minute, it’s still important for consumers to be vigilant with their data and continue to be on the lookout for non-legitimate emails, pop-up ads and other online sources that can cause problems. Even though we only seem to hear about big-name data breaches, we still need to be aware of personal online behavior to keep data safe and out of the bad guys’ hands.

Agari is doing our part to restore consumer trust in email, but we would love your help! Seen any good “bad” phishing emails lately? Tweet us a screenshot at @AgariInc – with none of your identifying information in it of course- and use the hashtag #gophish

Leave a Reply

Your email will not be published. All fields are required.

January 24, 2019 Armen Najarian

Healthcare Brand Impersonation Scams Targeting Consumers Can Cost You Millions

November 20, 2018 Fareed Bukhari

BIMI Adoption Off to a Fast Start—Standard Offers New Way to Showcase & Safeguard Brands Online

November 13, 2018 Fareed Bukhari

DMARC Adoption Rising, but 87% of Fortune 500 Still Vulnerable to Email-based Brand Impersonation

June 21, 2018 Armen Najarian

Identity is the New Perimeter. Do You Trust It?

April 21, 2015 Agari

Email Trust Cloud Protects Against Cyber attacks Aids CISOs in Customer Protection & Security

mobile image