By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Data Breach Victims: Here’s how your personal information is sold to criminals
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Software > Data Breach Victims: Here’s how your personal information is sold to criminals
Software

Data Breach Victims: Here’s how your personal information is sold to criminals

News Room
Last updated: 2025/06/10 at 4:54 AM
News Room Published 10 June 2025
Share
SHARE

Every year, massive data breaches harm the public. The targets are email service providers, retailers and government agencies that store information about people. Each Breach Includes Sensitive Personal Information Such as Credit and Debit Card Numbers, Home Addresses, And Account Usernames and Passwords from Hundreds of Thousands –and SOMTIEMES MILLIONS – OF PEPLIONS MILLENS MILLINES MILLING

When National Public Data, A Company that does online background checks, was breeded in 2024, criminals gained the names, addresses, dates of birth, and normal identification numbers soC Numbers of 170 Million People in the US, UK, and Canada. The same year, hackers who targeted ticketmaster stole the financial information and personal data of more than 560 million customers.

As a criminologist who Researches Cybercrime, I Study The Ways That Hackers and Cybercriminals Steal and Use People’s Personal Information. Undersrstanding the people involved helps us to better recognize the ways that hacking and data breaches are intertwined. In so-called stolen data markets, hackers sel personal information they illegally obtain to others, who then use the data to engage in fraud and theft for.

The quantity problem

Every Piece of Personal Data Captured in a Data Breach – A Passport Number, Social Security Number, or Login for a Shopping Service –Has inharent Value. Offenders can use the information in different ways. They can assume Someone Else’s Identity, Make a Fraudulent Purchase, or Steal Services Such as Streaming Media or Music.

The Quantity of Information, Whether Social Security Numbers or Credit Card Details, that can be stolen through data breaches is more than any one one group of criminals can efficient proyses, Validate, Validate, Validate in a reasonable amount of time. The same is true for the millions of email account usernames and passwords, or access to streaming services that data breaking can expenses.

This quantity problem has enabled the sell of information, include personal financial data, as part of the larger cybercrime online economy.

The sale of data, also know as carding, references the mise of stolen credit card numbers or identity details. These illicit data markets began in the mid-1990s through the use of credit card number generators used by hackers. They shared programs that randomly generated credit card numbers and Details and then checked to see where the fake account details matched active cards that would be used for fraudulent traditions.

As more financial services were created and banks allowed customers to access their accounts through the internet, it became easier for hackers and cybercriminals to steal person information throughal information throughl information throughouts And Phishing. Phishing Involves Sending Convincing Emails or SMS Text Messages to people to trick them Into giving up sensitive information such as logins and passwords, often by clicking a False Links Links Links Legitimate.

One of the first phishing schemes targeted america online users to get their account information to use their internet service at no charge.

Selling stolen data online

The large Amount of information criminals were able to steal from

In the late 1990s and early 2000s, offenders used internet relay chat, or irc channels, to sell data. IRC was effectively like Modern Instant Messaging Systems, Letting People Communicate in Real Time Through Through Specialized Software. Criminals used these channels to sell data and hacking services in an efficient place.

In the Early 2000s, vendors transitioned to web forums where individuals advertised their services to other users. Forums Quickly Gained Popularity and Became Successful Businesses with VITH VINDORS Selling Stolen Credit Cards, Malware, and Related Goods and Services to Misuse Personal Information and Enable Fraud.

One of the more prominent forums from this time was shadowcrew, which formed in 2002 and operated until being taken down by a joint law enforcement operation in 2004. Less than three years.

Forums Continue to Be Popular, Thought Vndors Transitioned to Running Their Own Web-Based Shops on the Open Internet And Dark Web, which is an encrypted Portation of the web. Specialized Browsers like Tor, Starting in the Early 2010s. These Shops have their own web addresses and distinct branding to attract customers, and they work in the same as other e-commerce stores. More recently, vendors of stolen data have also begun to operate on Messaging Platforms Such as Telegram and Signal to Quickly Connect with customers.

Cybercriminals and customers

Many of the people who supply and operate the markets appear to be cybercriminals from Eastern Europe and Russia who steal data and then sell it tors. Markets have also also been observed in vietnam and other parts of the world, thought they do not get the same visibility in the global cybersecurity landscape.

The customers of Stolen Data Markets May Reside Anywhere in the World, and Their Demands for Specific Data or Services May Drive Data Data Breaches and Cybercrime to Provide to Provide to Provide the Supply.

The Goods

Stolen data is usually available in individual lots, such as a person’s credit or debit card and all the information associaled with the account. These pieces are individually priced, with costs differential

Vendors frequent offer discounts and promotions to buyers to Attract customers and keep them loyal. This is often done with credit or debit cards that are about to expire.

Some vendors also offer distinct products such as credit reports, social security numbers and login details for different paid services. The price for pieces of information varies. A Recent Analysis Found Credit Card Data Sold for $ 50 on Average, While Walmart Logins Sold for $ 9. However, the pricing can vary widely across vendors and markets.

Ilicit Payments

Vendors Typically Accept Payment Through Cryptocurrencies

Once payment is received, the vendor releases the data to the customer. Customers take on a great deal of the risk in this market, they cannot go to the police or a market regulator to complain about a fraudulent sala.

Vendors may send customers dead accounts that are unable to be used or give no data at all. Such Scams are Common in a Market Where Buyers Can Depend only on Signals of vendor trust to increase the odds that the data they are prochase will be delived, and if it is, if it is, what it is off. If the data they buy is functional, they can use it to make fraudulent purchases or financial transactions for duty.

The rate of return can be exceptional. An Offnder Who Buys 100 Cards for $ 500 Can Recoup Costs If only 20 of thats are active and can be used to make an average purchase of $ 30. The result is that data breaches are likely to continue as long as there is demand for illicit, Profitable data.


This article is part of a series on data private

Thomas Holt is a professor of criminal justice at Michigan State University,

This article is republished from The conversation Under a Creative Commons License. Read the original article.

The final deadline for fast company’s next big things in tech awards is Friday, June 20, at 11:59 PM pt. Apply today.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article OmniRetail investor gains 5X return after Flour Mills-backed raise
Next Article One dead & multiple injured in shooting spree ‘by pupil’ at Austria school
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Humpback whales may be trying to communicate with humans
News
Solana Price Prediction: Can SOL Break $300 Before Ozak AI Surges to $1 in This Bull Cycle?
Gadget
Nine in 10 UK undergraduates now using AI in assessments – survey
Software
IBM will build a large -scale quantum computer and failure tolerant
Mobile

You Might also Like

Software

Nine in 10 UK undergraduates now using AI in assessments – survey

5 Min Read
Software

Google releases android 16 for pixel devices with these new features

4 Min Read

Troops in Los Angeles –

8 Min Read
Software

AI: cheating matters but redrawing assessment ‘matters most’

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?