How Quickly Hackers Access, Use Your Personal Data Following A Data Breach

Jul 19, 2021, 7:13 PM | Updated: 9:19 pm

SALT LAKE CITY — You might already know that when personal information gets compromised in a data breach, it often ends up on the dark web where hackers can access it and use it. But do you know how quickly the cyber criminals can reach your data once it hits the dark web?

It could happen within an hour, a cybersecurity researcher told the KSL Investigators, in hopes of sharing this knowledge so we can better protect ourselves.

Crane Hassold normally works hard at keeping the bad guys away from leaked personal information, like our email addresses and passwords. But Hassold, who is the senior director of Threat Research for Agari, and his company did the opposite. They deliberately planted thousands of dummy login credentials in online hacker forums.

“While we are certainly looking to protect our customers against email-based threats, we want to know the full cycle of how these attacks operate,” explained Hassold.

After six months of planting credentials from popular software applications, the Agari researchers found:

  • Nearly one out of five (18%) accounts gets accessed within one hour
  • 40% are accessed by cyber criminals within six hours
  • Half are tapped into within 12 hours of ending up on the dark web

What’s worse is the research showed that often, the hacker only actually logs into a compromised account once. It’s what they do while inside the account that pays off for them.

Agari watched hackers change security settings and set up inbox rules to surreptitiously forward future emails back to the hackers.

“Some attackers that are writing rules, looking for specific types of information and emails, only send me the emails that have to do with payments or invoices or customer information, and only send those to me,” explained Hassold.

What it all showed to Hassold is that it is not enough to change our passwords once our email address has been compromised. He said you need to go through the process of really figuring out what the crook did while inside.

“If an attacker has set up any inbox rules that will forward copies of emails out to another email address, those need to be remediated as well and taken care of as well,” he said. “And so, you need to make sure that all of the footprints of an attacker needs to be taken care of before a compromised account can be determined to be completely fixed.”

The cyber criminals mostly used the dummy accounts to try to send out more phishing emails and links to get even more login credentials.

Hassold said if your account is hacked, you must act fast.

KSL 5 TV Live

Top Stories

KSL Investigates

Americans are using their credit cards more often as the economy opens....
Matt Gephardt

Gephardt Busts Inflation: The key to saving money on your credit card bills

More Utahns are carrying debt, but the thing is – many of those folks have no idea how much interest they are paying on their debt.
4 days ago
Matt Gephardt and Cindy St. Clair

AmeriGas customers nationwide Get Gephardt after waiting weeks for propane

Calls to Get Gephardt have come from across the country, all having the same problem: missing propane deliveries. So, where’s the gas?
4 days ago
(Taylorsville Police Department)...
Keira Farrimond and Daniella Rivera

Questions surround convicted rapist’s release as police investigate aggravated sexual assault

Despite admitted anger issues and a recent history of assault, Utah’s Board of Pardons and Parole released a convicted rapist back into the community last month. Now, he is charged with aggravated rape in an attack on a Taylorsville woman he communicated with while in prison.
4 days ago
Grant Clark waited for repairs on his car...
Matt Gephardt

Get Gephardt: Orem man’s auto repairs take 13 months due to parts shortage

If your car needs minor repairs, be prepared to wait. That warning comes from a Utah County man who had to wait for more than a year for his car to get fixed.
6 days ago
Susan Lee Wilson, attempting to use her phone after another outage. (KSL-TV)...
Matt Gephardt

Get Gephardt: Salt Lake woman battles phone company to fix 12-year-old landline problem

You pay for phone service, so you would expect to receive phone service. But when a Sandy woman’s landline kept going dead for more than a decade, she decided it was time to Get Gephardt.
7 days ago
A police officer walks by a crime scene trailer that is sitting outside the home of Michael Haight ...
Annie Knox and Daniella Rivera

When home isn’t safe: Experts see patterns, potential warning signs in family shootings

In Utah and on a national level, mass shootings mostly happen at home. While it’s not always possible to predict this type of violence, experts tell the KSL Investigators certain behaviors may predict future violence.
7 days ago

Sponsored Articles

Fiber Optical cables connected to an optic ports and Network cables connected to ethernet ports...
Brian Huston, CE and Anthony Perkins, BICSI

Why Every Business Needs a Structured Cabling System

A structured cabling system benefits businesses by giving you faster processing speeds and making your network more efficient and reliable.
notebook with password notes highlighted...
PC Laptops

How to Create Strong Passwords You Can Actually Remember

Learn how you can create strong passwords that are actually easy to remember! In a short time you can create new ones in seconds.
house with for rent sign posted...
Chase Harrington, president and COO of Entrata

Top 5 Reasons You May Want to Consider Apartment Life Over Owning a Home

There are many benefits of renting that can be overshadowed by the allure of buying a home. Here are five reasons why renting might be right for you.
Festive kitchen in Christmas decorations. Christmas dining room....
Lighting Design

6 Holiday Decor Trends to Try in 2022

We've rounded out the top 6 holiday decor trends for 2022 so you can be ahead of the game before you start shopping. 
Happy diverse college or university students are having fun on their graduation day...
BYU MBA at the Marriott School of Business

How to Choose What MBA Program is Right for You: Take this Quiz Before You Apply!

Wondering what MBA program is right for you? Take this quiz before you apply to see if it will help you meet your goals.
Diverse Group of Energetic Professionals Team Meeting in Modern Office: Brainstorming IT Programmer...
Les Olson

Don’t Let a Ransomware Attack Get You Down | Protect Your Workplace Today with Cyber Insurance

Business owners and operators should be on guard to protect their workplace. Cyber insurance can protect you from online attacks.
How Quickly Hackers Access, Use Your Personal Data Following A Data Breach