SHARE
Facebook X Pinterest WhatsApp

What Happens to Stolen, Sensitive Data?

Feb 26, 2016

What Happens to Stolen, Sensitive Data?

What Happens to Stolen, Sensitive Data?What Happens to Stolen, Sensitive Data?

An experiment that leaked a fake bank employee’s data to the dark Web shows what happened to the data during its first month out in the open.

Immediate Spike in ActivityImmediate Spike in Activity

When the credentials were leaked, a rush of hackers tested the fake bank employee’s Google Drive credentials in several of the victim’s other accounts. They quickly downloaded files, including those with real credit card information.

Torrent of ActivityTorrent of Activity

Within hours of leaking the credentials, 1,400 visits from 30 countries across six continents were recorded. Here are the demographics: Russia: 35%, U.S.: 16%, China 4%, Japan 2%

Logins to Fake BankLogins to Fake Bank

One-tenth of the hackers who viewed the credentials tried to log into the bank Web portal.

Hacked Once, Hacked EverywhereHacked Once, Hacked Everywhere

The fictitious bank employee used the same password for personal banking accounts and social media sites. Once hackers used leaked credentials to access his Google Drive, most used those same credentials elsewhere.

Other Accounts AccessedOther Accounts Accessed

36% of hackers successfully accessed the victim’s personal banking account using the leaked password. There were recurring logins, some within hours of one another and others weeks after the initial login.

The NumbersThe Numbers

94% of hackers uncovered and attempted to log into other accounts. Five tried bank logins within the first 24 hours. Three attempted Google Drive logins in the first 24 hours. Within 48 hours, the first file was downloaded.

The Power of TORThe Power of TOR

68% of hackers accessed both the Google Drive and the bank portal from TOR-anonymized IP addresses.

Hackers More Security Conscious Than EverHackers More Security Conscious Than Ever

The high rate of TOR usage indicates that hackers are becoming more security conscious and know to mask their IP’s whenever possible to avoid getting caught.

Other OccurrencesOther Occurrences

Hackers changed the victim’s password. They made several attempts to crawl the Google Drive, using third-party apps. Some downloaded files did not appear sensitive, including lunch menus.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.