BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
TechForum

What to do when your info is found for sale


Johannesburg, 30 Jul 2020
Read time 3min 50sec
Douw Gerber, Business Development Manager at leading South Africa-based managed IT security services company, Securicom
Douw Gerber, Business Development Manager at leading South Africa-based managed IT security services company, Securicom

Dealing in stolen account credentials is big business for hackers. They can easily and widely trade login credentials and full account details in cyber criminal marketplaces to make money for minimal effort. Although privileged accounts, such as administrator accounts, are considered most valuable, the credit card details and banking information of just about anyone with some money in the bank is also valuable.

“If you transact online, you’re valuable to a hacker. Your login credentials and banking details are inventory for hackers to sell for fraudulent purposes. Once your bank account is compromised, they have full access to your money and any other sensitive information that is linked to your account. It’s not just banking details that are fodder for cyber criminals; ID numbers, physical addresses and e-mail addresses are also valuable,” warns Douw Gerber, Business Development Manager at leading South Africa-based managed IT security services company, Securicom.

Research by cyber security company Digital Shadows suggests there are over 15 billion stolen username and password credentials doing the rounds on the dark Web. The average cost of a stolen bank account is $70.91, but some fetch for up to $500. Prices are influenced by whether or not there is confirmation of access to a certain amount of funds and whether there is other personal identifiable information linked to the account.

“It’s a small price compared to the trouble that can be potentially unleashed on victims. They pay the highest price in the form of having their bank accounts cleaned out, fraudulent purchases made using their credentials, or worse, identify theft,” comments Gerber.

He says hackers acquire account details and credentials in a variety of ways. They hack into company networks and accounts, they use spyware and other malware to capture passwords and user credentials, and they use phishing scams. People don’t know that their account details have been stolen or put up for sale until they receive an alert from their bank or suffer a loss of some kind.

According to Gerber, there is little than anyone can do to remove their personal identifiable information from the dark Web. However, he says there are a few things that people should do if they find out that their credentials are available on the dark Web.

“Start with a virus scan on your computer and any other mobile device you use to shop, bank, share or transact with online. This is important because if you have a piece of malware installed on any of your endpoints, it will continue to monitor your activity and log your keystrokes. So, if you change your usernames or passwords, these will be logged too. To prevent your devices from being compromised again, install robust endpoint security on all of your devices and make sure that these are kept updated.

“Once viruses have been removed, you can go about changing usernames and passwords on accounts that have been compromised. If it is an e-mail address that has surfaced on the dark Web, you should change the login credentials for accounts that are linked to that address. Passwords should never be a word. They should contain at least 12 characters, including uppercase and lowercase letters as well as numbers and symbols. It is also a good idea to have two-factor authentication on your most important accounts. This adds an extra layer of security that makes it harder for a hacker to get in.

“Check all your bank accounts for strange activity and missing money. If you notice anything, contact your bank. Make sure to routinely check your statements for odd activity.”

Gerber stresses the importance of being educated about cyber crime and understanding the risks of engaging and transacting online.

The uBreach functionality within Securicom’s uSecure – a cloud-based cyber security awareness platform – can quickly identify exposed e-mail accounts and identities that have been publicly disclosed online via third-party data breaches.

uSecure is offered on a subscription basis for as low as R21 per user per month, making it affordable to individuals and companies of all sizes. For more information, go to https://www.e-purifier.com/index.php/usecure/. Follow Securicom on Facebook: https://www.facebook.com/securicomZA

Securicom

Securicom provides best-in-industry, cloud-based Managed IT Security Services to address the increasing and ever evolving security threats that businesses face. Its partnerships with leading, global technology providers, combined with extensive experience in building and delivering locally hosted security services, ensure that its partners and customers can benefit from state of the art IT security, regardless of their size or number of users. Securicom’s solutions include email, endpoint and web protection, network security and cyber security monitoring. Securicom has offices in Johannesburg, Cape Town and Namibia; and has customers across the globe. For more information on Securicom, please visit www.securicom.co.za.

Editorial contacts
Kerry Webb (082) 496 0713 kerry-lee@mweb.co.za
Login with