Saturday, December 3, 2022

Darknet markets generate millions in revenue selling stolen personal data


Hacker in binary code digital background. Cyber crime and internet privacy hacking. Network security, Cyber attack, Computer Virus, Ransomware, and Malware Concept. 2D illustration.

Enlarge (credit: Peach_istock via Getty Images)

It is common to hear news reports about large data breaches, but what happens once your personal data is stolen? Our research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of producers, wholesalers, and consumers. But this supply chain involves the interconnection of multiple criminal organizations operating in illicit underground marketplaces.

The stolen data supply chain begins with producers—hackers who exploit vulnerable systems and steal sensitive information such as credit card numbers, bank account information, and Social Security numbers. Next, the stolen data is advertised by wholesalers and distributors who sell the data. Finally, the data is purchased by consumers who use it to commit various forms of fraud, including fraudulent credit card transactions, identity theft, and phishing attacks.

This trafficking of stolen data between producers, wholesalers, and consumers is enabled by darknet markets, which are websites that resemble ordinary e-commerce websites but are accessible only using special browsers or authorization codes.

Read 13 remaining paragraphs | Comments

Reference : https://ift.tt/eZLE7qC

No comments:

Post a Comment

Spies hack Wi-Fi networks in far-off land to launch attack on target next door

One of 2024's coolest hacking tales occurred two years ago, but it wasn't revealed to the public until Friday at the Cyberwarcon c...