Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982.

ESI Provides Elite experts in:

Digital and Electronic Evidence, Computer Forensics, Cell Phone Forensics
Trucking, Truck Accident Investigation and Trucking Regulations, Truck Safety Consulting, Heavy Vehicles & Hazardous Materials
Sports and Fitness, Fitness Facility Standard of Care
Real Estate & Land, Real Estate Syndication
Bankruptcy and Corporate Governance
Accident Reconstruction

Call for a free consultation: 866-795-7166

Digital Security Expert:

Identity Thieves Use Stolen Data Faster Than You Think!

 

Digital Security Expert Witness / Digital Forensics Articles

By Scott Greene

 

Identity Thieves Take As  Little As 9 Minutes To Access Stolen Accounts!

 

Evidence Solutions

 

 Recently, the Federal Trade Commission’s (FTC) Identity Theft Task Force (ITTF) set out to find out just how fast hackers attempt to use stolen data.

 

The Test

 The study was conducted using about 100 sets of fake information. The information included what appeared to be a normal online customer database. The data in the database included items such as names, physical addresses, email addresses, phone number, and different types of payment information. To make the data appear real, the phone numbers were associated with the physical addresses and the payment information included one of three different types of payment sources: a credit or debit card, online payment service or a bitcoin wallet.

 The FTC went so far as to use Census data and real addresses to ensure the data appeared to be genuine.

 The data was then posted on a website that hackers use to exchange stolen identity information. The fake identities were posted twice to the same site, in slightly different formats.

 

The Results

 Within nine minutes of the second posting, the account information began to be used.  There were over 1200 attempts by the identity thieves to access the email and payment accounts.

 Email account access was attempted, likely to find additional information about the account holders. Email can be a treasure trove of information, indicating where individuals make purchases and giving criminals additional information about the individuals.

 There was significant activity by the thieves to access the fake payment accounts. This is logical as the cyber criminals would want to make changes to the account to be able control it, or drain the account if the account had a balance.

 Online purchases were also attempted using the fake payment accounts supplied in the test data. The purchases included clothing, food delivery, retail purchases, online games as well as online dating site memberships.

 The Identity Theft Task Force (ITTF) was launched in 2006, by a President Bush executive order. The goal of the ITTF is to identify how identity theft happens and to combat it. In the over ten years since the creation of the task force, there have been great strides to educate the public and reduce identity theft. However, the Federal Trade Commission (FTC) still received approximately 500,000 complaints from citizens about identity theft.  A Department of Justice (DOJ) report says that in 2014, approximately 7% of the US population over the age of 16 (approximately 17.6 million individuals) were victims of identity theft.

 

Protect Yourself

 The  ITTF determined that two-factor authentication (2FA) prevented thieves from gaining access to the accounts. 2FA is a process that requires both a password and what is referred to as a second factor such as a code or PIN sent to a phone to access an account. Because the criminals did not have access to the second factor, they were unable to access the accounts. 2FA is not a security cure-all, but it certainly can help.

 For more tips, check out our articles on Cyber Security on our website: www.EvidenceSolutions.com.

 

By Scott Greene 

Evidence Solutions, Inc.

 

Questions on Digital Security and Forensics? 

 

Contact us!

 

Call us today for a FREE consultation: 866-795-7166

or

Email us: This email address is being protected from spambots. You need JavaScript enabled to view it.

 

Related Digital Security and Forensics Expert Articles:

The Turkish Crime Family Threatens Apple Products

Phishing Emails Are Behind 91% of Cyberattacks

Digital Forensics Expert: Free Flash Drive - Don't Do It!

Cyber Security Expert: Security Tips Keep Your Data Safe 6-9

Cyber Security Expert: DHS CISO Is Serious About Security 

 

Trucking Regulation and Safety Experts:

Trucking Expert: Government Imposters Target Commercial Truck Owners

Transportation Deaths Up & Mining Oil Deaths Down

Trucking Regulation Expert: ELD Required in December 2017

Trucking Expert: Senate Passes 2016 DOT Funding Bill  

 

Sports and Fitness Accident Prevention Experts:

Sports Injury Expert: Easy Sports Injury Prevention!

 
 

Complex Electronic Evidence in PLAIN English.

Like Evidence Solutions - Digital Forensics Experts on Facebook

Follow Evidence Solutions - Vehicle Evidence Experts Division on LinkedIn

Circle Evidence Solutions - Digital Forensic Investigation Experts on Google+

Google+ Author

Google+ Publisher