4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Much Does Stolen Data Go For? Less Than You Might Think

How Much Does Stolen Data Go For? Less Than You Might Think

How much do you think a criminal would pay for your company’s sensitive data that’s been stolen by hackers? As it turns out, your data may not be worth as much as you may think, and that’s a bad thing for you and your business.

Where (and How) Data is Sold
When your data is stolen, it will more than likely be put up for sale on the dark web. The dark web is only accessible via specialized identity-cloaking software. Many of the pages offering stolen data and illegal services look just like a ‘normal’ sales website would, complete with buyer ratings. These dark websites offer caches of stolen data that other criminals would find useful, and sing cryptocurrency like Bitcoin, anyone can buy stolen identities or credentials.

Let’s assume for a moment that you fell victim to a cybercriminal that managed to steal the information for a variety of corporate bank accounts and credit cards. A buyer can access the seller’s page and specify what information they are looking for, which will influence the price of the information. Buyers can request specific information such as:

  • The kind of credit card, like Visa, MasterCard, etc.
  • The card’s security codes
  • Any associated login credentials
  • The card’s expiration date
  • The name that appears on the card
  • The card holder’s credit score
  • The Social Security Number associated with the card
  • The card holder’s date of birth
  • History of where the card has been used
  • The original owner’s mother’s maiden name.

Once the purchaser has selected which information they want, the cost is calculated and the data can be downloaded.

The Cost
Like any business transaction, the price for stolen data is subject to the laws of economics. The less that the data is currently available, the higher the price will be. Alternatively, if a recent hack has flooded the black market with a massive supply of the desired data, then prices are apt to decrease significantly.

Due to the rapid changes that this black market experiences, these prices vary wildly. On average, the data from a stolen credit card will cost someone somewhere between $13 to $21. These cards are typically bought will a comprehensive (or very nearly) set of the associated information, denoted as “fullz” in dark web jargon.

Pricing for other types of data is a little different. Many cybercriminals are mostly interested in online payment service accounts, which are priced based off of account balances. Bank account information can vary from $100 for a $2,000-account, to $1,000 for a $15,000-account, while electronic medical records can bring a cybercriminal $350 each.

What This Means
These days, it’s more important than ever to secure your company’s data against theft. Cybercriminals tend to reach for the low-hanging fruit when selecting a target. 4IT can help you put the security measures in place to keep your data secure and off the dark web. Give us a call at 305-278-7100.




No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Hardware Business Continuity Workplace Tips VoIP Saving Money Computer User Tips Upgrade Windows 10 Miscellaneous Virtualization Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Alert Communication Save Money Network Microsoft Office Small Business communications Smartphone Quick Tips Information Technology Mobile Office Social Media Smartphones BYOD Going Green Apps Android Office Health Chrome Browser Gadgets Application Ransomware Managed IT Services Outsourced IT Operating System Holiday Mobility Firewall Tablet Avoiding Downtime WiFi Productivity Managed IT Disaster Best Practice Data Management Risk Management The Internet of Things Cybercrime Remote Computing Unified Threat Management IT Solutions Telephone Systems Spam BDR Passwords Search Cybersecurity VPN Facebook History Remote Monitoring Employer-Employee Relationship Hard Drives Budget Saving Time Apple Automation Vendor Management Hacking Data Backup Wireless Technology Phishing Password iPhone Customer Relationship Management Hosted Solution Big Data Money Computers Content Filtering Phone System Recovery Proactive IT Data Recovery User Error Marketing Office Tips Law Enforcement Collaboration Office 365 Shortcut Humor Administration Current Events Social Wearable Technology Maintenance PowerPoint Printer Virus Telephony USB Encryption Analytics Gmail Router Government Vulnerability Bring Your Own Device Lithium-ion battery Work/Life Balance Antivirus OneNote Business Intelligence Computer Repair Trending Education Data Security Net Neutrality Politics Personal Information Social Engineering Tech Support Wireless Unsupported Software Users Outlook Private Cloud Google Drive Cloud Computing Windows 8 Save Time App Data Protection Cost Management Intranet SaaS Bandwidth Printer Server Audit HaaS Point of Sale Laptop IT COnsultant Emergency Artificial Intelligence Travel Applications Update Customer Service Biometrics hacker Retail Virtual Reality Transportation Display Meetings Augmented Reality Computer Care Battery Social Networking Robot Emails Paperless Office Instant Messaging Automobile End of Support HIPAA Entertainment Fax Server Benefits IT Support Workplace DDoS Computer Accessories Windows 10 Internet Exlporer Streaming Media Mouse Compliance Uninterrupted Power Supply Internet of Things online currency Identity Theft Solid State Drive Flexibility Sports Two-factor Authentication Managing Stress Network Congestion Excel Data Storage Help Desk Samsung Efficency Wi-Fi Nokia IT Technicians Training File Sharing Programming Administrator Blogging Cast Colocation SharePoint Consultant The Blindside Of Windows 10s Company Culture systems Black Market Nanotechnology Access Website Teamwork Touchscreen IT Security Tablets Hard Disk Drive Busines Continuity Near Field Communication Cleaning hack OneDrive Root Cause Analysis Networking HBO Amazon Experience Keyboard NFL Avoid Downtime best practices Co-managed IT Human Resources IT consulting Cortana CrashOverride IT Management Hard Drive Running Cable Music Hiring/Firing Word data breach Lifestyle Ebay Reliable Computing Legislation Settings Data storage Books Uograde WIndows Server 2008 Images Computing Smart Technology Windows Ink Video Games risk management Bloatware Document Management Data Breach Patch Management Advertising Google Maps Legal Touchpad Branding Mobile Device Commerce Managed Security Regulation Distributed Denial of Service Scam Software as a Service Wiring Twitter WIndows 7 Information Sync eWaste Storage Inbound Marketing Surge Protector Regulations Employer Employee Relationship Data Loss iOS Managed IT Service Operating Sysytem Television Worker Commute Debate Adobe PDF 3D Printing Managed IT Services Value Cameras Google Docs Scalability Computer Fan Files User Safety Licensing Text Messaging Science Presentation Microsoft Excel How To ISP Dark Web Chromecast Virtual Desktop Screen Mirroring Bluetooth Best Available Upgrades Mobile IT solutions Professional Services Buisness Shadow IT Relocation Youtube Microblogging Comparison Sales Managed Service Provder Tutorial Specifications Webinar Taxes IT service Supercomputer Electronic Medical Records Domains IT Budget Webinar Gift Giving Reputation