On the Site:

KSL INVESTIGATES

How Quickly Hackers Access, Use Your Personal Data Following A Data Breach

Jul 19, 2021, 7:13 PM | Updated: Jul 14, 2023, 2:33 pm

SALT LAKE CITY — You might already know that when personal information gets compromised in a data breach, it often ends up on the dark web where hackers can access it and use it. But do you know how quickly the cyber criminals can reach your data once it hits the dark web?

It could happen within an hour, a cybersecurity researcher told the KSL Investigators, in hopes of sharing this knowledge so we can better protect ourselves.

Crane Hassold normally works hard at keeping the bad guys away from leaked personal information, like our email addresses and passwords. But Hassold, who is the senior director of Threat Research for Agari, and his company did the opposite. They deliberately planted thousands of dummy login credentials in online hacker forums.

“While we are certainly looking to protect our customers against email-based threats, we want to know the full cycle of how these attacks operate,” explained Hassold.

After six months of planting credentials from popular software applications, the Agari researchers found:

  • Nearly one out of five (18%) accounts gets accessed within one hour
  • 40% are accessed by cyber criminals within six hours
  • Half are tapped into within 12 hours of ending up on the dark web

What’s worse is the research showed that often, the hacker only actually logs into a compromised account once. It’s what they do while inside the account that pays off for them.

Agari watched hackers change security settings and set up inbox rules to surreptitiously forward future emails back to the hackers.

“Some attackers that are writing rules, looking for specific types of information and emails, only send me the emails that have to do with payments or invoices or customer information, and only send those to me,” explained Hassold.

What it all showed to Hassold is that it is not enough to change our passwords once our email address has been compromised. He said you need to go through the process of really figuring out what the crook did while inside.

“If an attacker has set up any inbox rules that will forward copies of emails out to another email address, those need to be remediated as well and taken care of as well,” he said. “And so, you need to make sure that all of the footprints of an attacker needs to be taken care of before a compromised account can be determined to be completely fixed.”

The cyber criminals mostly used the dummy accounts to try to send out more phishing emails and links to get even more login credentials.

Hassold said if your account is hacked, you must act fast.

KSL 5 TV Live

KSL Investigates

In the moment they feel like small purchases, right? An ornament here. A stocking stuffer there. A ...

Matt Gephardt

How you can avoid holiday debt despite the pressure to spend

In the moment they feel like small purchases, right? An ornament here. A stocking stuffer there. A last-minute office gift. But all this can quickly add up to a financial holiday hangover. And perhaps it’s one you’re still feeling from the last holiday season.

18 hours ago

After a yearlong fight for a copy of the Utah attorney general’s schedule, KSL’s attorneys have...

Annie Knox and Daniella Rivera

KSL files motion seeking release of AG’s calendar in public records fight

After a yearlong fight for a copy of the Utah attorney general’s schedule, KSL’s attorneys have asked a judge to order the release of the records, without the case going to trial.

22 hours ago

Man's picture with details about him...

Daniella Rivera

Sandy case highlights challenges tracking sex offenders who move across state lines

The KSL Investigators have been following the case of a convicted sex offender from California who moved into a Sandy neighborhood but did not show up on Utah's registry for nearly a year. Now, we don't know where he is, but we do know he's not a resident at the latest address he gave to authorities.

2 days ago

Debra Gamero teaches a student...

Matt Gephardt

The insurance you didn’t know you needed to protect your side hustle

Having a side hustle to bring in extra cash requires determination and hard work. But if you do it without the right insurance policy, you might find an unexpected event could blow up your side hustle along with your finances.

8 days ago

Text messages shown on Mindy Dahlquist's phone. (Aubrey Shaffer, KSL TV)...

Deanie Wimmer

Majority of Americans, especially women, feel overwhelmed by group texts

Group texts can be hard to navigate because they come from our closest family members and friends. A social media researcher and an etiquette expert recommend using boundaries and technology to take control, without ruining relationships.

9 days ago

If you drive your car for work and you're in a crash, can your insurance company refuse to pay? Tha...

Matt Gephardt and Sloan Schrage

Get Gephardt: Rideshare driver says company’s insurance refuses to cover her wrecked car

If you drive your car for work and you're in a crash, can your insurance company refuse to pay? That's the exact issue currently afflicting a Cedar City woman who decided it was time to Get Gephardt, and our Matt Gephardt began investigating.

10 days ago

Sponsored Articles

Stylish room interior with beautiful Christmas tree and decorative fireplace...

Lighting Design

Create a Festive Home with Our Easy-to-Follow Holiday Prep Guide

Get ready for festive celebrations! Discover expert tips to prepare your home for the holidays, creating a warm and welcoming atmosphere for unforgettable moments.

Battery low message on mobile device screen. Internet and technology concept...

PC Laptops

9 Tips to Get More Power Out of Your Laptop Battery

Get more power out of your laptop battery and help it last longer by implementing some of these tips from our guide.

Users display warnings about the use of artificial intelligence (AI), access to malicious software ...

Les Olson

How to Stay Safe from Cybersecurity Threats

Read our tips for reading for how to respond to rising cybersecurity threats in 2023 and beyond to keep yourself and your company safe.

Design mockup half in white and half in color of luxury house interior with open plan living room a...

Lighting Design

Lighting Design 101: Learn the Basics

These lighting design basics will help you when designing your home, so you can meet both practical and aesthetic needs.

an antler with large horns int he wilderness...

Three Bear Lodge

Yellowstone in the Fall: A Wildlife Spectacle Worth Witnessing

While most people travel to this park in the summer, late fall in Yellowstone provides a wealth of highlights to make a memorable experience.

a diverse group of students raising their hands in a classroom...

Little Orchard Preschool

6 Benefits of Preschool for Kids

Some of the benefits of preschool for kids include developing independence, curiosity, and learning more about the world.

How Quickly Hackers Access, Use Your Personal Data Following A Data Breach