Why Your Data Has Most Likely Been Stolen and What Can You Do About It

Roland Yegorov
Oct 26 · 6 min read

I used to consider myself pretty knowledgable about the cyber-world, but then I started learning about cyber-security and reading reports by companies like Shape Security, IBM and Snyk.

I couldn’t be more wrong.

Only it was happening long before I was even born. In 1983 Ronald Reagan saw a movie WarGames and proposed to enact a law that would prevent from unauthorised computer access. In 1984 the first law regarding cyber-security was brought to life.

(Note: I will add references at the end of the article ⭐️)

So, I’m a little bit late for the security train. Nevertheless, each year cyber-crimes are becoming an increasingly bigger threat to everyone.

The Center for Strategic and International Studies (CSIS) made a Significant Cyber Event report that spans from 2006 to September 2019. This report focuses on “cyber attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars”.

Based on this report I made a rough accumulation of some data points:

(Full report accumulation can be downloaded here)

Some of these incidents are truly scary.

February 2019. European aerospace company Airbus reveals it was targeted by Chinese hackers who stole the personal and IT identification information of some of its European employees.

December 2018. North Korean hackers stole the personal information of almost 1,000 North Korean defectors living in South Korea

June 2017. Russian hackers used an updated ransomware program to target Ukrainian infrastructure, including power companies, airports, and public transit.

All of these are pretty big cyber-crimes. You might think that for smaller companies and simple mortals like me it’s not a problem. Wrong.

“Ignorance is Strength” —1984 by George Orwell

In a 2018 report about Credential Spills (i.e. stolen credentials) by Shape Security, it talks about the problem of credential spills and credential stuffing (i.e. automation of trying out different combinations of logins and passwords until you get a working combination) in 4 major industries — retail, hotel, airlines and banking.

From Credential Spill 2018 report
From Credential Spill 2018 report

In retail credential stuffing attacks makeup, on average, 80–90% of an online retailer’s login traffic

90%. That’s nine zero. I couldn’t believe it at first, but the more I read the report the more this number made sense. The main reason retailers are attacked in such amounts is because of us — customers.

In the era of Amazon and 1 day deliveries, we are getting increasingly impatient about waiting — be it in a queue or while a website is loading.

Numerous articles have been written on the importance of reducing friction for customers such as improving website load times.

Thus, while we strive to make the web faster and more user friendly we are also inevitably making it more criminal friendly. Such studies make a website focus on the immediate problem — getting users to their website as fast as possible and making the number of steps necessary to make an action as little as possible.

Therefore, most websites are unwilling to introduce additional security measures that increase friction for a user. However, by omitting things like 2 factor authentication (2FA), not enforcing strong passwords, allowing to use passwords that have already been reported as compromised (this point was also mentioned in the 2017 study by NIST), etc., businesses compromise the trust of billions of people.

Even if you think that you usually don’t specify a lot of information about yourself on the internet, what cyber-criminals do is create something like a person's identity file. All the information that they could get on a specific account is linked with other spilled data about that user. In the end, some cyber-criminals would know you better than your mom.

This is called a Personally Identifiable Information or PII.

With PII a hacker could then, for example, completely takeover your phone company’s account. Watch this video on how easily Vishing (phishing via phone) can be performed:

What should we do?

Politics are shaped, elections tampered with, military blueprints and classified information leaked, your family’s photos used, people fleeing dictatorships discovered, your car hacked.

For Software Developers

For Everyday Users

  • If possible, don’t store more personal information than necessary on any website
  • Don’t save card data on websites
  • Use 2FA wherever possible
  • If your password doesn’t look like gibberish — 8@U^K%fsGA85V*uP change it!
  • Don’t use public WiFi for handling any sensitive data
  • If you do use a public WiFi, use a VPN service. (UPDATE: Watch this video on VPN claims)
  • Educate yourself about the cyber-crimes of today like Phishing, Vishing, Smishing (probably my favourite name) and others.

For Everybody


Also, I suggest that you check if a website, your email or password have been compromised via the links below.

References

Roland Yegorov

Written by

Freelance Fullstack developer. Enjoy clean code, refactoring and a good cup of tea.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade