Different sources for cyber fraudsters to collect data for exploiting information for identity theft

Mentioned below are the different sources from which cyber criminals exploit the different vulnerabilities to steal individual’s identity.

  • Data entered in survey forms given in restaurants, lucky draw coupons, at shopping malls/movie theaters requesting personal information.
  • Data shared when you casually speak on phone or directly about your personal and family topics in public places with your friends and family, unaware that fraudsters may be watching and listening to our conversation and use this information for fraud activities.
  • Data entered after shopping at supermarkets and medical stores and retail chains in malls.
  • Data collected through mail/messages promising some benefit in the form of cash prize/ lottery/job offers through email/WhatsApp/SMS. They send emails with logos similar to the original websites making them feel like authorized one. They may ask you to click on a link which redirects to another page, where you are asked to give your personal sensitive information like passwords, OTPs etc.
  • Criminals may access your private information from online shopping portals, e-commerce sites and online bank accounts and use that information against you for self-benefit.
  • Identity thief casually goes through different profiles in social media through a fake account. From the profiles they select a few gullible targets for attacking. They send ‘friend’ request to initiate a relationship and try to gain trust through chatting. After gaining trust they get hold of sensitive personal information from the potential targets.
  • Data in government registers or public records which are improperly handled.
  • Criminals try to retrieve information from computer servers that is not secured or monitored properly. They may access routers, through ports which are configured improperly or opened unknowingly, or have weak password which are vulnerable to identity thefts.
  • Stealing of personal information can happen through malware. Malware can be sent through mail/SMS/WhatsApp link. Malwares can be in different forms like Viruses, Spyware, Rootkits, Remote Access Tools, etc.,
  • Stealing personal information from smart credit/debit or other smart payment cards (like shopping, gift cards etc.) can be read through RFID (Radio Frequency Identification) device without even physical contact with the card.