{"id":2161,"date":"2013-06-27T10:00:15","date_gmt":"2013-06-27T14:00:15","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=2161"},"modified":"2020-02-26T10:40:36","modified_gmt":"2020-02-26T15:40:36","slug":"hacking-value","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hacking-value\/2161\/","title":{"rendered":"If There&#8217;s Value, They Will Hack It"},"content":{"rendered":"<p>Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there\u2019d be some serious value in a compromised online bank or PayPal account, but what about <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-data-leak\/\" target=\"_blank\" rel=\"noopener nofollow\">Facebook<\/a> or <a href=\"https:\/\/www.kaspersky.com\/blog\/skype-government-surveillance\/\" target=\"_blank\" rel=\"noopener nofollow\">Skype<\/a> or any of the other myriad of online services?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050429\/value_title.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-2162\" alt=\"value\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050429\/value_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>There are at least two ways in which we can enumerate this value. One of those ways is financial: what is the market value of a hacked account? However, these accounts are also valuable for their worth to social engineers. In other words, how can they be used in <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-101-your-official-guide\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing attacks<\/a> designed to compromise the other things that criminals compromise?<\/p>\n<p>Lucky for us, Brian Krebs, a former Washington Post reporter and one of the most well-respected journalists in the industry, published <a href=\"http:\/\/krebsonsecurity.com\/2012\/10\/the-scrap-value-of-a-hacked-pc-revisited\/\" target=\"_blank\" rel=\"noopener nofollow\">a chart<\/a> illustrating the value of hacked machines a few years back on his own news site, <a href=\"http:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Krebs on Security<\/a>. He has revisited the idea a few times including an evaluation of the values of hacked email and other accounts. Following Krebs\u2019 lead, <a href=\"http:\/\/www.securingthehuman.org\/resources\/posters\" target=\"_blank\" rel=\"noopener nofollow\">the SANS Institute has elaborated on this idea in a whole slew of languages<\/a>. The SANS chart is below:<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050427\/STH-Poster-YouAreATarget-LowResolution.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-2163\" alt=\"STH-Poster-YouAreATarget\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/06\/06050427\/STH-Poster-YouAreATarget-LowResolution.jpg\" width=\"915\" height=\"643\"><\/a><\/p>\n<p>Let\u2019s start with the direct financial value of various accounts estimated by Krebs\u2019s based on his tendency to trawl through the sketchy black-market forums in which they are sold. <a href=\"http:\/\/krebsonsecurity.com\/2013\/06\/the-value-of-a-hacked-email-account\/\" target=\"_blank\" rel=\"noopener nofollow\">He claims<\/a> that a prominent seller of this stuff charges $8 for iTunes accounts; $6 for Fedex.com, Continental.com, and United.com accounts; $5 for Groupon accounts; $4 for Godaddy accounts; and a measly $2.50 for active Facebook and <a href=\"https:\/\/www.kaspersky.com\/blog\/twitter-improves-hack-protection\/\" target=\"_blank\" rel=\"noopener nofollow\">Twitter<\/a> accounts. I\u2019m sure these prices jump a bit if the accounts belong to valuable targets, like diplomats, prominent business people, celebrities, defense contractors, and others. <a href=\"http:\/\/krebsonsecurity.com\/2012\/12\/exploring-the-market-for-stolen-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">In a separate piece<\/a> based on a different marketplace, Krebs found Dell, Overstock, Walmart, Tesco, BestBuy, Target and other online retail accounts worth between $1 and $3.<\/p>\n<p>The funny thing about hacked PayPal and online bank accounts is that their value isn\u2019t as straight forward as you might think. Let\u2019s say you\u2019ve got $2000 in a bank account or on a credit card or available on PayPal. The value of that account would be two grand, right? Not really. The criminals that compromise these accounts do it on a wholesale level. They usually aren\u2019t compromising and emptying the accounts themselves. To do so is simply too labor intensive and too risky. Instead, they hack the account, and sell access to it on these same underground, black-market forums.<\/p>\n<div class=\"pullquote\">A criminal with access to your primary email account can likely reset the passwords to and take control of every other account you own.<\/div>\n<p>I\u2019ve read some indictments and other research describing the pricing schemes for particular gangs of criminals running scams ranging from fake credit card (carding) operations hacked PayPal account sales. The values vary vastly, but the general rule is that prices go up if the accounts belong to Americans or Europeans and in correlation with the amount of money stored. For services that allow linking with bank accounts or credit cards or verification via email, all of those things will increase the value the account. Dancho Danchev, a prominent security researcher, wrote up a great article showing how <a href=\"https:\/\/threatpost.com\/paypal-credentials-sale-access-offered-proxy-server-022013\/\" target=\"_blank\" rel=\"noopener nofollow\">these factors changed the value of compromised PayPal accounts back in February<\/a>.<\/p>\n<p>Another popular way to make money on a compromised financial account is to use <a href=\"https:\/\/www.kaspersky.com\/blog\/where-does-the-money-go\/\" target=\"_blank\" rel=\"noopener nofollow\">money mules<\/a>. In these cases your account is pretty much worth what\u2019s in it, but it\u2019s kind of a different animal altogether. Very briefly, money mule operators put out advertisements offering easy money to anyone that will remove money from a bank account and wire it off to wherever the criminal is located. The crooks running these scams aren\u2019t advertising for money mules, but the people that accept these offers are, without their knowledge, acting as money mules. Oftentimes they are not paid after withdrawing and moving the money.<\/p>\n<p>Email and financial accounts are harder to evaluate because much of their value depends upon the contents of the accounts and the identity of their rightful owner, which makes this a pretty good place to transition into the non-financial value of hacked accounts. Email accounts are often the hub through which every other account is controlled. When you forget a password, you reset it through your email account. My passwords are often so unique and so good that I have no option but to reset them through my email because I\u2019ll never remember them otherwise.<\/p>\n<p>I practice very good security on my email accounts and you should too, because if the account through which all of your accounts are managed gets hacked, then you are potentially in big, big trouble. A criminal with access to your primary email account can likely reset the passwords to and take control of every other account you own. I recommend that you change passwords quarterly and that you implement absolutely every single advanced security feature available to you. Two-factor, mobile authentication is a must. I can reset my email password through a mobile device and I have a secret email account with which I can recover my primary email in the unlikely event that someone hacks my account and steals my phone. Same goes for my bank account which requires a second step of authentication and has an annoyingly complicated password.<\/p>\n<p>A hacked email account is also a danger to every single one of your contacts. The same logic can be applied to your various social media accounts. These people you connect with trust you. If a malicious link comes in a phishing email from a known email account, your contacts or friends or connections will probably open it, and that is on you. You\u2019ll have to live with the fact that your lazy security practices sunk someone else\u2019s ship and I hope you lose sleep over it! Just kidding, I hope you practice strong security and never run into these problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered what a hacked computer, email address, or other online account is even worth? Sure, it seems pretty obvious that there\u2019d be some serious value in a<\/p>\n","protected":false},"author":42,"featured_media":2165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[19,78,245],"class_list":{"0":"post-2161","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-email","9":"tag-hackers","10":"tag-online-accounts"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-value\/2161\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-value\/2161\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hacking-value\/2161\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacking-value\/2161\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacking-value\/2161\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-value\/1097\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-value\/2161\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacking-value\/2161\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/email\/","name":"email"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2161"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2161\/revisions"}],"predecessor-version":[{"id":32818,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2161\/revisions\/32818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2165"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}