Do you think that your personal data is of no interest to hackers?
Here's why your data is worth gold to them.
More than 30 billion pieces of personal data were breached in 2020. For some of them, the security breach came from the password. If you have escaped it so far, you should not think you are completely out of danger. Even if you feel like you have nothing to hide, your data is of interest to hackers... Here’s why.
You have nothing to hide?
In their private use of digital technology, Internet users generally feel little concerned by problems related to cybersecurity. Some people are very little informed about cyber risks and the behavior to adopt on the web, while others think: “I have nothing to hide, why would hackers come after me?” And we can’t blame them, computer security sometimes has aspects that are quite technical, even complex, difficult to access for beginners.
However, every year, billions of pieces of data are compromised around the world by cybercriminals. A large part of it come from the private digital practices of Internet users who a priori do not have much to hide... apparently! Because, in reality, no matter the presumed “value” of your data, the important thing is to understand the motivations of hackers when they steal it. You will thus understand why, in fact, all personal data can have value in their eyes.
Your personal data is of interest to hackers!
With a few stolen personal information, cybercriminals can do you a lot of harm. Here are concrete examples.
Identity theft
Hackers may seek to use your personal information (last name, first name, address, date of birth, credit card number, etc.) to try to obtain services in your name, for example making online purchases or obtaining a bank loan.
Many telephone switchboards will allow you to make requests simply by verifying your basic personal information (last name, first name, date of birth). So that’s all a hacker needs to do the same thing.
Selling on the Dark Web
Some hackers sell your data to other cybercriminals on the Dark Web. Buyers can then use them for their own criminal purposes. This makes them less easily identifiable themselves.
Try to access your bank account
If the hacker knows your telephone number, the name of your bank or even the name of your bank advisor, he may try to impersonate your advisor to lead you to entrust him with your confidential data and access your bank accounts.
Attacks against your loved ones
Using stolen personal information, hackers target your loved ones by pretending to be you. You may have already seen those emails saying: “I’m abroad and I have a big problem. It’s complicated, I’ll explain to you later. I need €3000 very quickly, can you send me a transfer please? I’ll pay you back when I get back.” In this way, victims are led to send money to hackers thinking they are doing a service to the person in difficulty…
Attacks against your colleagues
Some hackers target a company’s staff to pressure them into disclosing sensitive information or making payments. When these phishing attacks target a specific individual or small group, they are called “spear-phishing”. The typical example is CEO fraud. The hacker begins by recovering as much information as possible about the manager of a company, its suppliers, its economic situation, the people who have control over payments, etc. Then he creates an email box in the name of the CEO, sends an email to the person authorized to make transfers from the company account and justifies a secret operation, which should not be discussed in the office, linked to the current project to make a transfer to the victim. The more non-secret personal information about employees and the company the attacker has, the more likely this attack will be successful.