Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Leveraging breached data to unmask cybercriminals

By Luke Wilson
Outsourcing Data: Don't Take a Fairytale Approach
October 16, 2020

Companies lucky enough to avoid cybersecurity incidents can no longer turn a blind eye or claim these aren’t their problem. As the saying goes, there are two types of companies: those that have suffered a breach and those that will. In our digital economy, everything is interconnected and if your organization has something of value to a fraudster, they will eventually target your company. Alarmingly, cybercriminals can operationalize and use data that is pulled from a separate breached organization against yours.   

How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.

Most credentials stolen from companies are consumer-oriented and are useful on one platform to another – think usernames and passwords. Cybercriminals continue to re-release big combo packages with aggregated credentials gathered from newer, large-scale breaches. Every time these big combo packages surface, billions of email addresses or usernames associated with clear-text passwords recirculate in underground communities, making the data increasingly accessible for malicious use, such as account takeover and other identity-based attacks.

Oftentimes, these attacks are successful not because of lax security protocols, but because poor password hygiene is still an issue – password reuse is rampant. According a 2018 Verizon Data Breach Investigations Report, 81% of company data breaches resulted from poor password security. Companies must balance ease of access and usability with cybersecurity, and this means passwords are not something we can avoid in the near future. An easy preventative measure is mandatory cybersecurity awareness training. In 2019, it was reported that 43% of employees – nearly half – lacked regular data security training, which is too low.

During this extended remote work period, there are already so many threat vectors that companies must account for, and the last thing a company needs is a user error accidentally exposing sensitive information. Individuals must remain extra vigilant to avoid becoming the weakest link in their organization’s chain.

However, bad actors slip up as well. Their data is out there, because many of them are ordinary citizens. There’s a misunderstanding that you need advanced computer skills or sophisticated tools when all you really need is access to computers, data, and persistence. Just as threats actors leverage breached data, so can organizations that hold these treasure troves of data, such as financial and healthcare companies, or government agencies. Through identity attribution, it is possible to piece together the digital footprints of these threat actors to not only understand what the nature of the attack was, but also who was behind the attack and their motivation.

Despite criminals doing all they can to obfuscate their identities, breached data can assist with investigations into fraud, crime and other illicit activities, as well as protecting consumer identities. From unmasking adversaries to domain monitoring to password validation, cybercrime intelligence teams can effectively neutralize and disrupt offensive cyber operations and their infrastructure by utilizing breached data and quickly acting on intelligence.

Of course, speed to actionable intelligence is key. In the time period from occurrence to discovery to containment and remediation, cybercriminals are siphoning through the data, trying to figure out how to exploit it. Instead of playing whack-a-mole, identity intelligence now allows for companies to take a proactive approach to identifying the threat actor – helping thwart future attacks.

Moving forward, leveraging breached data, as well as open source intelligence, makes identity attribution not only possible, but reliable in a swift and efficient manner, especially as companies face reductions to their investments in cybersecurity. Identity information is proliferating in the surface, social, deep and dark webs and bad actors are using this information to launch new attacks. This problem isn’t going away anytime soon. Organizations should take advantage of the tools and data at their disposal and take a more proactive approach.

KEYWORDS: cyber security data breach information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Luke square large

Luke Wilson is Vice President of intelligence at 4iQ. Luke brings a wealth of knowledge and expertise, with 15+ years working within federal law enforcement, department of defense, and the intelligence community.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-breach-freepik.jpg

    UN computer networks were breached by cybercriminals

    See More
  • Revised NIST Cyber Security Framework - Security Magazine

    Leveraging packet data to improve network agility and reduce costs

    See More
  • ransomware - cyber

    Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing