Let’s Talk

Work
Services
Digital
/
Creative
/
Marketing
Knowledge
Agency
Contact

Email us at

info@okmg.com

Say hello

1300 93 6564
CareersPaymentsStripe Set Up
PrivacyDisclaimerTerms & Conditions
Go Back to Knowledge Base

Stolen Data – How Stolen Data Is Exploited by Hackers

Financial crimes resulting from a data breach are just one of the many ways that criminals use stolen data..
Published
May 21, 2018

Financial crimes resulting from a data breach are just one of the many ways that criminals use stolen data. A compelling write-up by Avivah Litan, an analyst from Gartner Inc. discusses the numerous ways that stolen consumer data can be used from compromised business servers.

How stolen data is used by hackers:

Here are four such ways:

  1. Stolen data can be resold in the black market, the convoluted underground of the Deep Web.
  2. Stolen data can be leveraged to complement and update previously stolen identities with their respective PII (personally identifiable information). The home addresses and phone numbers in records already taken may be outdated. Data from recent breaches can be used to update them, as well as patch up missing information.
  3. Stolen data can be readily used to assume control of the existing bank, phone service, brokerage, and retirement fund accounts. The stolen PII in such accounts can be quickly entered and tried in various online systems, thus enabling hackers to gain control of, move, and take existing funds.
  4. Stolen data can be bought wholesale by nation states. And with accurate PII-endowed accounts at a nation-state’s disposal, political disruption and intellectual property theft such as gaining access to blueprints of weapon systems are more readily accomplished.

How Businesses Can Minimise the Risks of Having Data Compromised

Avivah Litan recommends using identity verification that is not reliant on static PII, which is likely to have already been stolen in the past. Dynamic identity data are not based on PII and come with unique behavioural indicators. Litan also emphasises the effectiveness of multi-layered identity verification, especially for those with privileged access to sensitive client data. Companies must implement multi-layered identity proofing for business managers and cybersecurity personnel. That way, if one identity layer ends up getting compromised, there are still others that will effectively hinder access and prevent full identity claim.


‍

Related Posts

Best Webflow Website for a Non-Profit Company

View

How to integrate Shopify with Zapier

View

Low Cost Webflow Website for a Insurance Company

View

AI Agents in Customer Support: Revolutionising Helpdesks

View

How to integrate WordPress with Google Workspace

View

Top 10 Webflow Website for a Pet Products Company

View
Next

Let's

Create value
Grow revenue
Launch a brand
Drive traffic
Build community
Push boundaries
Win together

Let’s discuss how we can bring reinvigorated value and purpose to your brand.

Start a Project

Email us at

info@okmg.com

Say hello

1300 93 6564
Perth

608 - 610 Stirling Hwy Mosman Park, Perth WA, 6012

Melbourne

Level 17, 31 Queen St Melbourne, VIC, 3000

LinkedIn icon
YouTube icon
Copyright © 2025
Terms & ConditionsPrivacyDisclaimerCareersPayments

Book a discovery call. Let's talk about what's next for your business.

Book a discovery call

Book Now