Page 210 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 210

•      Social Media and OSINT Lookup: Many social platforms and apps let users find friends
            by phone or email. Attackers can abuse these features (or their APIs) to discover your accounts. In fact,
            Twitter disclosed that bots were uploading huge lists of phone numbers just to see which ones hit a
            match, effectively building a reverse lookup database of users. A phone number plugged into people-
            search tools or even Google can surface LinkedIn profiles, WhatsApp statuses, Skype IDs, or forum
            posts. From one account, others often follow—your Instagram might reveal your full name, which leads
            to a search that uncovers your other profiles, and so on. The web of connected accounts starts to light
            up one by one.

                   •      Password Reset and Account Recovery Routes: An exposed email address opens doors
            via the password reset function on countless sites. A malicious actor who has your email can attempt to
            reset passwords on popular services; even if they don’t succeed without access to your email inbox or
            phone, they might learn which sites you use (some services inadvertently disclose whether an email is
            registered). If they do have your email account (or convince an email provider or phone carrier to help
            via social engineering), they can snowball into many other accounts by triggering password resets. This
            domino effect is precisely how a compromised email led attackers to multiple connected accounts in one
            incident.

                   •      Cross-Service Identity Linking: Our digital identifiers are often used beyond login. For
            example, if you use the same email for an e-commerce account, a social media profile, and a health app,
            and  one  of  those  leaks  it,  criminals  can  correlate  that  email  across  different  dumps  or  platforms  to
            assemble a richer picture (perhaps linking your email to a real name, physical address, or medical info
            from separate breaches). They know people recycle personal information across platforms, so finding
            one identifier in one place can validate that it’s the same person elsewhere.

            From a privacy advocate’s perspective, this interconnectedness is alarming. It means that despite all the
            passwords and security measures on individual accounts, your online life has a single point of failure: the
            exposure of a secondary identifier. An opportunistic attacker doesn’t need to “hack” 20 different sites to
            learn about you; they can simply pivot from one exposed ID. In practical terms, this could mean a stalker
            starting with your cell number and ending up with your home address and family photos, or a scammer
            starting with your email and discovering where you bank and shop. It’s a chain reaction of vulnerability—
            one link weakens, and the whole chain can come undone.



            The Cybersecurity Implications of Linked Identities

            The fallout from a single identifier leak can extend far beyond embarrassment or nuisance; it raises
            serious cybersecurity threats for individuals and organizations alike:

                   •      Targeted Phishing and Scams: Once attackers know which services you use (because
            they discovered your linked accounts), they can craft convincing phishing emails or texts. For instance,
            if they uncover that you have an account at a particular bank or an online store, they can send you tailor-
            made fake alerts appearing to come from those businesses. The success rate of phishing climbs when
            the attacker has personal context. A trove of leaked phone numbers has already led to surges in SMS
            phishing (“smishing”) attacks impersonating companies that users trust.






                                                                                                            210
   205   206   207   208   209   210   211   212   213   214   215