Week 49: Targeted attacks using leaked data

13.12.2022 - Last week, the NCSC received more reports than in the previous week, with 641 in total. Data leaked during data breaches can be used for targeted phishing or fraud. Therefore, regularly checking your email address for data leaks will help to protect you from unpleasant surprises.

Leaked data facilitates highly targeted attacks

A data breach occurs when data stored with an internet service provider is lost or stolen and misused for attacks. Information from over ten billion different email accounts is now on the internet – and this is only the number of known data leaks.

The data leaked in a data breach is offered for sale in most cases. A report received by the NCSC last week is a good example of the fact that the data can be misused not only when passwords are leaked. The report concerned a data leak involving the streaming platform Wakanim. Aside from the account names, first names, surnames, IP addresses, home addresses, telephone numbers and email addresses were also leaked.

News on the data breach and the successful sale of data from 6.7 million users. Wakanim has not provided any official information to date.
News on the data breach and the successful sale of data from 6.7 million users. Wakanim has not provided any official information to date.

The data from this data breach was apparently sold on the darknet as early as September 2022. However, the person who submitted the report did not find out about the data misuse until the end of October, and then only because the antivirus program on his computer flagged the data leak when scanning an email.

A quick check on the internet security platform iBarry.ch, an initiative launched by Swiss businesses and authorities, indicated that the email address had been leaked.

iBarry.ch provides support on various internet security topics, including various checks, such as the possibility to check whether an email address has turned up in a data leak
iBarry.ch provides support on various internet security topics, including various checks, such as the possibility to check whether an email address has turned up in a data leak

The definitive proof that the data of the person who submitted the report had been leaked from Wakanim was provided by a check directly at Have I Been Pwned – the data provider for iBarry.

Haveibeenpwned.com is a service that provides data from known data breaches for verification. It lists the data leaks in which the email address you are checking appears and provides additional details about the type of data leak.
Haveibeenpwned.com is a service that provides data from known data breaches for verification. It lists the data leaks in which the email address you are checking appears and provides additional details about the type of data leak.

Leaked data is very suitable for targeted attacks. Such data may also be misused for fraudulent purposes. With the combination of an email address and the knowledge that the recipient is a Wakanim customer, like in the case described above, emails with content tailored to the victim can be sent to demand passwords or credit card details, for example, or to lure the recipient into opening a malicious document. The inclusion of first name, surname and address additionally generates trust, causing the recipient to think that the email must be legitimate. The NCSC is unaware of the original email in this case. However, Wakanim is currently issuing warnings about possible phishing attempts.

Wakanim is currently issuing warnings about possible phishing attempts
Wakanim is currently issuing warnings about possible phishing attempts

Data misuse cannot be prevented. However, if you know which data can be misused by fraudsters, you can exercise the necessary caution and not fall for the fraudsters' attacks so easily.

Last modification 13.12.2022

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/aktuell/im-fokus/2022/wochenrueckblick_49.html