Page 155 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 155

The journey begins with compromise. Cybercriminals use a blend of tactics to harvest personal and
            corporate data:

               •  Data Breaches remain the most prolific source. In 2024, India witnessed an alarming rise in
                   targeted attacks against financial institutions, insurance firms, and healthcare providers. A single
                   breach at a medical diagnostics firm led to the exposure of over 5 million patient records, which
                   quickly surfaced on dark web marketplaces.
               •  Phishing Scams continue to be weaponized at scale. Fake emails, SMS messages, and even
                   job offers are designed to lure victims into handing over credentials or downloading malware.
               •  Malware Attacks are often embedded in pirated apps, infected websites, or unsecured Wi-Fi
                   networks. Once installed, they silently capture keystrokes, login credentials, and financial data.
               •  Credential  Stuffing  thrives  on  weak  or  reused  passwords.  Hackers  simply  automate  login
                   attempts using data leaked from previous breaches—often with shockingly high success rates.
               •  Insider Threats also play a role. Employees, either disgruntled or incentivized, may leak or sell
                   sensitive databases directly to cybercriminals.




            The Business of Stolen Data

            Once harvested, the data is cleaned, categorized, and auctioned like inventory in a wholesale warehouse.
            A full identity—known as “fullz”—can fetch between $10 and $100 depending on its quality. A hacked
            bank account with a clean transaction history? That can go for hundreds.

            Here's how the monetization lifecycle works:

               1.  Bundling  and  Valuation:  Cybercriminals  compile  stolen  data  into  categories  like  login
                   credentials, medical records, tax IDs, or passport scans. Each bundle is priced based on its utility
                   and rarity.
               2.  Dark Web Marketplaces: Platforms like Genesis, BlackForums, and Hydra function like eBay—
                   complete with user reviews, refund policies, and customer service. Sellers build reputations over
                   time, and the most reliable vendors command premium prices.
               3.  Crypto-Powered Transactions: Payments are made via cryptocurrencies such as Bitcoin and
                   Monero to maintain anonymity. Smart contracts and escrow services often protect both parties.
               4.  Exploitation and Resale: Buyers may directly use the data to commit fraud—applying for loans,
                   stealing medical benefits, or launching phishing campaigns—or they may resell the information
                   to other actors.



            A Case in Point: The AT&T Breach

            In March 2024, a massive breach involving AT&T made headlines after data from over 70 million current
            and former customers was discovered on a dark web forum. Unlike ransomware attacks where data is
            held hostage, this breach was purely transactional. The attackers didn’t demand a ransom; they directly
            monetized  the  data,  selling  it  to  the  highest  bidder.  Among  the  exposed  data  were  Social  Security







                                                                                                            155
   150   151   152   153   154   155   156   157   158   159   160