Facts Security Part 3: How your PII can be used for Nefarious Purposes

August 25 2023
~1800 words, ~9-10 min read. ~300 word TLDR at the bottom =)
Introduction
Can the Data that I expose become Information, to the point where there is enough
Information out there to become Facts about me that could negatively impact me
if it were in the wrong hands?
Let's try to answer this question by using examples of digital attacks that have
actually happened, threats that actually exist. This might give us hints on what
needs to be secured, and inspire us to actually do something about it.
Email Account HACKED
Not wanting other people to access our personal accounts is a common belief to
have. That's why we configure things like passwords, and we know that we don't
want people to obtain both our account name and password because in some cases
that is enough to gain access to our account. It's clear we want to avoid the
Fact "XYZ is the password to my account ABC" being known and exposed. What outcomes
are we trying to avoid by securing this Fact? To explore this, let's use the
example of an Email Account.
Today, literally everyone who utilizes services on the Internet will have an email
account. Email accounts have a plethora of functions. You can use it to communicate
with people. You can use it to store Data and Information. You can use it to set up
accounts with other services. The value of this communication, data storage, and
account linkage will likely be subjective. However, it seems undeniable that
email addresses are one of the fundamental tools the average Internet users utilize.
A bad actor with your email account credentials can potentially do many things:
-The obvious, they can access your account.
-They can change your password, taking away your access.
-They can read your emails, which may contain private Information that you don't
want to reveal.
-They can impersonate you, using the account to email your contact list (or anyone
else for that matter). The contacts might believe it is you and be tricked to do
something such as download malware, enter their Information in a fake URL, or
send money.
-They can blackmail you.
-They can download all of your emails, creating a copy of your Data that may exist
on the Internet for a long time.
-They can delete anything and everything. There may be ways to recover from this,
at best you temporarily lose access to your Data, and at worst your Data is lost
forever.
-They can access other accounts that are linked to the email address.
Understanding the risks reflected upon your personal risk threshold can help
you determine if the Information in your email account is important to you. If
you aren't concerned with any of the risks, just a password might be fine for
your use case. If you have Information that you don't want to risk, perhaps think
to add additional security to that account such as Multi-Factor Authentication (MFA).
Here are some factors that may put your account(s) at greater risk:
-You only use a password to secure your account, allowing various automated
authentication attacks to have potential success.
-You use a weak password, maybe even on a 'most common passwords' list.
-You use the same password across multiple accounts, and one of those services
had a data breach which leaked your credentials.
-You got phished, for example clicking a fake link and entering your username
and password.
SIM Swapping
An interesting method of stealing digital assets emerged in the form of 'SIM
Swapping'. With MFA securing accounts, bad actors needed a way around it. MFA,
or Multi-Factor Authentication, is an account configuration such that two or more
factors are needed to access an account. Three common factors used are passwords,
email addresses, and phone numbers, where an additional piece of Data is sent to
the email address or phone number at login time to be used as an additional input.
On top of this, many services have an 'I forgot my password' mechanism, which may
utilize an email account or phone number to reset the password. This means that
some accounts can always be accessed by whoever has control over the phone number
associated with that account.
Those that had access to the vast amounts of stolen or exposed PII were able to
utilize that to target high profile accounts, such as accounts that held large
amounts of digital currency. With PII, they were able to convince (via hiring,
bribing, or social engineering) the support workers of mobile carriers into
transferring the victim's phone number to a new SIM card in the bad actor's
possession. This gives them control over any accounts the victim may have where
the password reset mechanism requires that phone number.
Due to how cryptocurrency works, a bad actor with access to your cryptocurrency
account can move your assets out in such a way that makes it difficult to trace
the final destination. In other words, it could be very difficult to catch the
bad actor by following the assets, decreasing the chances of recovering those
assets.
If these risks apply to you, then perhaps you would want to take extra security
measures such as a separate private phone number nobody knows, or a different
form of MFA such as a physical key. Your username could also be hard to guess
based off public Information about you (e.g. your email address, your online handle).
Some factors that could make you the target of SIM Swapping:
-You openly talk about the digital assets you have in your accounts, such as on
social media. Or, perhaps you are a well-known wealthy individual.
-Data that can lead to your account, such as email addresses, personal handles,
phone number, etc, are public.
-The security of your valuable accounts can be bypassed by whoever has control of
your phone number.
Identity Theft
Identity theft refers to cases where PII and other Information is collected and
used by a bad actor for fraudulent purposes. Many Data points, such as name,
social security number, credit card number, etc., are used depending on the type
of fraudulent activity.
There have been past cases of massive data breaches that exposed the credit card
Information of millions of people. This Data was stolen and used for malicious
purposes such as fraudulent transactions and selling the stolen Data itself.
There have been cases of medical identity theft, where stolen personal Information
was used to make fraudulent claims on medical services. This could have consequences
such as mysterious medical bills, or fraudulently withdrawing limited prescribed
medications.
There have been cases of tax identity theft. Just as recent as the COVID-19 times,
the social security numbers of deceased people and people in prison were used
by bad actors to collect benefits.
Identity theft truly is a tough one in terms of what an individual can do. In some
cases, the exposure of your PII is not even your fault, but the fault of the
organization that stored your data. Thankfully, banks seem to be putting in the
resources to mitigate fraudulent activity. As for medical and tax, you would
need to closely watch (or have someone monitor) the changes and updates to your
profiles. You would need to be on top of your own personal medical and tax
identities, and have mechanisms set up such that you are sent an alert for any
changes or updates.
DOXXING
Doxxing is the act of revealing private/personal Information about someone,
usually with malicious intent. Information revealed could include things like
full name, photo, age, gender, sexual orientation, home address, phone number,
email address, workplace, family Information, etc.
The frightening thing about this is that this could be a group of bad actors
targeting an individual. Bad actors would work together to expose the PII of
the victim in order to commit malicious acts such as identity theft, cyberbullying,
reputation damage, and even real life harassment.
I don't have much personal experience with online harassment. However, I don't
doubt that people can become attached to their online personas to the extent that
cyberbullying can cause emotional and psychological trauma. It seems inevitable
that the future generation will have an affinity with smart phones early on in
their lives, which is a catalyst for developing online personas. The question is
how we are supposed to help solve this. Are we supposed to prevent the younger
generation from developing so closely with smart devices, and reduce their exposure
to socializing on the internet? Or are we supposed to now come up with new cures
to online addictions and the mental damage linked to social media?
SWATTING
Swatting is an interesting case that shows how risks can lead to your door.
Swatting involves a bad actor tricking an emergency service (such as police) to
respond to an address of the bad actor's choosing. They can falsely report something
that could create the risk of injury or even death. There have been cases where
police end up shooting at the victim due to false reports that create a situation
where weapons are likely to be drawn. This occurs from just knowing an address (and
of course, some reason why the victim was targeted).
Realistically, this is only something to worry about if you are the type of person
that, for some reason or another, have enemies that would go this far to attack
you. This is akin to pulling the fire alarm or reporting a false bomb threat, in
that valuable resources are wasted for selfish and/or malicious reasons.
Conclusion
You know, it would be nice if there was a simple way to overhaul our digital
security. In this day and age, we have so many separate accounts such as banking,
government, medical, not to mention the plethora of social media accounts. This
means that we have to assess what level of security we want to use for each one
as well as continue to be aware of and make updates to these accounts. It sometimes
comes down to individual preference, or difference in risk thresholds, that
determines how much resources are invested into security. We could choose to manage
and secure just one account that is used to authenticate into every other account.
Or we could choose to manage and secure each individual account, assessing the
adequate security for each account based on the risks.
Whether we prioritize convenience, security, or a balance, there also looms the
question of who should be responsible for all of this Data. Should the individual
user be solely responsible for their own Data? Or do the organizations, that
require the collection and storage of this Data to use their services, have a piece
of the responsibility pie? Not to mention entities such as law and government
having the ability to take this Data from organizations regardless of any user
privacy protection promised by the organization...
TLDR, some Facts that we probably want to Secure if they apply to us
Email Accounts:
The Fact that your email account only requires the password XYZ and username
ABC to access (aka no MFA).
The Fact that you have contacts in your email account that, if asked via email,
would send money, download a file, or put their Information in a URL because they
trust you.
The Fact that you have private Information in your email account, which if exposed
can lead to situations you would want to avoid such as blackmail or leaking
confidential Information.
The Fact that your email account is linked to your ABC-XYZ accounts, which can
be accessed with only your email account.
The Fact that you can't afford to lose access to your email address, or have your
Data potentially modified or deleted, or your linked accounts accessed.
SIM Swapping:
The Fact that you have a valuable account that can be accessed with your phone
number and username, which is likely to have been public Information at some
point in time.
Identity Theft:
The Fact that your PII has been exposed in a past data breach and/or that there
may be enough public/exposed Information out there to make fraudulent claims under
your name. This is coupled with the Fact that you have not taken any extra steps
to secure your identity.
DOXXING:
The Fact that you have an online persona that you are personally attached to, to
the extent that reputation damage and online harassment could affect you negatively.
The Fact that you have an online persona that you don't want associated with your
real life identity, to the extent that if this Information were exposed it could
affect you negatively.
SWATTING:
The Fact that you have negative relationships with people that are willing and
able to take big risks to their own personal reputation to negatively impact you.