Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

3 Scary Attacks that Exposed Personally Identifiable Information (PII)

The Internet is a double-edged sword with a set of good potential, but it does not come without its dangers.

With the real-world population increasingly opting for their digital avatars, the digital population is growing faster than ever. And it raises a heap of issues — especially for the security of the personal data.

Since personal data is an important asset for individuals and organizations, it is valuable for cybercriminals as well. Personally Identifiable Information (PII) is any personal data that can help identify an individual.

PII was initially restricted to unique personal data like Social Security Numbers in the US, email or mailing addresses, and phone numbers. In the digital age, the examples of Personally Identifiable Information now include IP addresses, login IDs, digital images, geo-location, biometric, and behavioral data as they can help identify a person in the digital world. Moreover, if some data can be mixed with some other data to correctly identify an individual, then this set of data is also considered as Personally Identifiable Information. For instance, the date of birth with gender and zip code may help identify a person, so these too are examples of PII.

According to RSI Security, “the public, and sometimes companies, provide this information freely without fully considering the consequences or without first determining that adequate protection measures are in place. Businesses and consumers alike need to understand the risks and recommended safeguards before releasing or storing private information.

PII is one of the most sensitive and valued data hosted by organizations, however, they underestimate the security requirements of PII. That is why there had been various cyberattacks in the last decade that leaked the data of billions of people, thus proving the importance of a hardened security posture for organizations. That said, let’s check out some cyberattacks that further proves this point.

Yahoo!

Once a technology behemoth, Yahoo! had been the talk of the town in recent years. A web services company founded in 1994, Yahoo! had provided numerous services over the decades including Yahoo! Mail, Yahoo! News, Yahoo! Search, and a lot more. Even more interestingly, Yahoo! Search was the premier search engine in the 1990s before the title was earned by Google in the 2000s.

In December 2015, Yahoo! announced that it was breached in 2013 affecting 1 million accounts. Later in October 2016, Yahoo! corrected its old statement to state that the breach in 2013 affected 3 million accounts — all accounts that were present at that time.

The breached data included names, email addresses, phone numbers, hashed passwords, birthdays, and security questions and answers in encrypted and unencrypted forms. After announcing the breach in December, Yahoo! took protective measures for all users like resetting passwords.

Related Posts
1 of 1,134

In the history of cyberattacks, the 2013 attack on Yahoo! is the worst attack seeing the number of records leaked in a single attack. Also, Yahoo! took almost three years to discover the data breach and disclose it to the public, which further increases the impact of the cyberattack disclosing PII of 3 million people.

Marriott – Starwood

Starwood Hotels and Resorts was one of the largest hospitality companies which got acquired by Marriott International in September 2016. It owned, operated, and franchised hotels, residences, resorts, spas, and vacation ownership properties in 100 countries. Starwood had numerous popular brands including Westin and Sheraton and owned, operated, or franchised 1200+ properties.

In December 2018, Marriott International announced a data breach related to its Starwood subsidiaries affecting more than 500 million people. In one of the worst breaches of time, attackers had access to the reservation systems of its Starwood subsidiaries right from 2014 — for four years. The breached data included names, addresses, phone numbers, and credit card numbers along with rare information such as passport numbers, travel dates, and locations, etc.

In this attack, a very sensitive form of Personally Identifiable Information (PII) got exposed. Through the reservation systems, attackers extracted data of people’s travel history — when and where people traveled and with whom. With such information, attackers could have been tracking the movements of popular persons like business executives, diplomats, military officials, and others.

FriendFinder Networks

FriendFinder Networks is another internet company that was founded during the early-Internet era of the 1990s. It mainly provides social networking, online dating, and adult entertainment services. Some of its popular online dating sites include FriendFinder, Adult FriendFinder, Amigos.com, BigChurch, Cams.com, and Penthouse. It also features numerous dating services targeting regions.

In November 2016, a breach notification website called LeakedSource disclosed that six databases of FriendFinder Networks were leaked, affecting 412 million accounts.

The data included usernames, email addresses, and passwords with poor security — they were either plainly stored or masked using SHA-1, a very easy hashing algorithm. LeakedSource told that 99% of the leaked passwords were crackable, allowing attackers to hijack those accounts and extract extra data from them. Also, the leaked data included controversial data including data of deleted accounts and Penthouse.com, which was sold in February 2016.

In this attack, the originally leaked data is usual per the definition of Personally Identifiable Information (PII). However, the biggest issue was the passwords were not stored securely, allowing attackers to extract more sensitive data by hijacking those accounts, raising the issue of the importance of securing PII. For example, individuals usually have their personal photos, sexual preferences, and past meetups info in their online dating account — supersensitive data.

15 Comments
  1. I’m really loving the theme/design of your weblog.
    Do you ever run into any browser compatibility problems?

    A small number of my blog visitors have complained about my blog not working
    correctly in Explorer but looks great in Firefox.
    Do you have any recommendations to help fix this issue?

  2. I’m gone to say to my little brother, that
    he should also pay a visit this webpage on regular basis to obtain updated from
    newest information.

  3. Can I simply say what a comfort to discover someone who really
    knows what they’re discussing on the web. You certainly
    know how to bring a problem to light and make it important.
    A lot more people should read this and understand this side of your story.
    I can’t believe you’re not more popular since you most certainly have the gift.

  4. When I originally commented I clicked the “Notify me when new comments are added” checkbox and now each time a comment
    is added I get several emails with the same comment.
    Is there any way you can remove me from that service? Thanks a lot!

  5. Hola! I’ve been following your blog for a while now and finally got the courage
    to go ahead and give you a shout out from Austin Tx!
    Just wanted to say keep up the fantastic work!

  6. ethambutol ordenado en España says

    Today, I went to the beach front with my kids.

    I found a sea shell and gave it to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She placed the shell to her ear and screamed.

    There was a hermit crab inside and it pinched her ear.

    She never wants to go back! LoL I know this is entirely off topic but I had to tell someone!

  7. prix du medroxy au Canada says

    I need to to thank you for this wonderful read!!

    I absolutely enjoyed every little bit of it. I’ve got you saved as
    a favorite to look at new things you post…

  8. If you desire to grow your knowledge only keep visiting this website and be updated with the hottest gossip posted here.

  9. I think that what you posted was actually very reasonable.
    But, consider this, what if you were to write a killer headline?
    I am not suggesting your information is not good, however suppose you added a
    post title that grabbed people’s attention? I mean 3 Scary Attacks that Exposed Personally Identifiable Information (PII) is kinda boring.
    You might peek at Yahoo’s front page and note how they create article headlines to
    get people to open the links. You might add a related video
    or a picture or two to grab readers interested about everything’ve got to say.
    In my opinion, it might make your website a little livelier.

  10. Your tips is incredibly intriguing. [url=https://www.younglimonynj.com/bbs/board.php?bo_table=free&wr_id=658552]artane Preisvergleich in Österreich[/url]

  11. You actually make it seem so easy with your presentation but I find this topic to be
    really something which I think I would never understand. It seems
    too complex and very broad for me. I am looking forward for your
    next post, I will try to get the hang of it!

  12. Wow, this article is good, my sister is analyzing such
    things, so I am going to convey her.

  13. Copper scrap collection service Copper scrap life cycle assessment Scrap metal appraisal
    Scrap Copper cable value, Scrap metal reclaiming management, Scrap Copper industry

  14. I loved as much as you’ll receive carried out right here.
    The sketch is attractive, your authored material stylish.

    nonetheless, you command get bought an nervousness over that you wish
    be delivering the following. unwell unquestionably
    come further formerly again since exactly the same nearly a lot often inside case you shield this hike.

Leave A Reply

Your email address will not be published.