{"id":54968,"date":"2025-12-12T07:58:29","date_gmt":"2025-12-12T12:58:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54968"},"modified":"2025-12-12T07:58:29","modified_gmt":"2025-12-12T12:58:29","slug":"what-happens-to-data-after-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/54968\/","title":{"rendered":"What happens to data stolen using phishing?"},"content":{"rendered":"<p>Imagine: a user lands on a scam site, decides to make a purchase, and enters their bank card details, name, and address. Guess what happens next? If you think the attackers simply grab the cash and disappear \u2014 think again. Unfortunately, it\u2019s much more complicated. In reality, the information enters a massive shadow-market pipeline, where victims\u2019 data circulates for years, changing hands and being reused in new attacks.<\/p>\n<p>At Kaspersky, we\u2019ve studied the journey data takes after a phishing attack: who gets it, how it\u2019s sorted, resold, and used on the shadow market. In this article, we map the route of stolen data, and explain how to protect yourself if you\u2019ve already encountered phishing, or if you want to avoid it in the future. You can read the <a href=\"https:\/\/securelist.com\/what-happens-to-stolen-data-after-phishing-attacks\/118180\/\" target=\"_blank\" rel=\"noopener\">detailed report complete with technical insights on Securelist<\/a>.<\/p>\n<h2>Harvesting data<\/h2>\n<p>Phishing sites are carefully disguised to look legitimate \u2014 sometimes the visual design, user interface, and even the domain name are almost indistinguishable from the real thing. To steal data, attackers typically employ HTML forms prompting users to enter their login credentials, payment card details, or other sensitive information.<\/p>\n<p>As soon as the user hits <em>Sign In<\/em> or <em>Pay<\/em>, the information is instantly dispatched to the cybercrooks. Some malicious campaigns don\u2019t harvest data directly through a phishing site but instead abuse legitimate services <a href=\"https:\/\/www.kaspersky.com\/blog\/google-forms-scam\/53909\/\" target=\"_blank\" rel=\"noopener nofollow\">like Google Forms<\/a> to hide the final destination server.<\/p>\n<div id=\"attachment_54969\" style=\"width: 1013px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064623\/what-happens-to-data-after-phishing-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54969\" class=\"size-full wp-image-54969\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064623\/what-happens-to-data-after-phishing-1.png\" alt=\"A fake DHL website. The user is asked to enter the login and password for their real DHL account \" width=\"1003\" height=\"570\"><\/a><p id=\"caption-attachment-54969\" class=\"wp-caption-text\">A fake DHL website. The user is asked to enter the login and password for their real DHL account<\/p><\/div>\n<p>The stolen data is typically transmitted in one of three ways \u2014 or a combination of them:<\/p>\n<ul>\n<li><strong>Email<\/strong>. This method is less common today due to possible delays or bans.<\/li>\n<li><strong>Telegram bots.<\/strong> The attackers receive the information instantly. Most of these bots are disposable, which makes them hard to track.<\/li>\n<li><strong>Admin panels.<\/strong> Cybercriminals can use specialized software to harvest and sort data, view statistics, and even automatically verify the stolen information.<\/li>\n<\/ul>\n<h2>What kind of data are phishers after?<\/h2>\n<p>The range of data sought by cybercriminals is quite extensive.<\/p>\n<ul>\n<li><strong>Personal data<\/strong>: phone numbers, full names, email, registration and residential addresses. This information can be used to craft targeted attacks. People often fall for scams precisely because the attackers possess a large amount of personal information \u2014 addressing them by name, knowing where they live, and which services they use.<\/li>\n<li><strong>Documents<\/strong>: data and scans of social security cards, driver licenses, insurance and tax IDs, and so on. Criminals use these for identity theft, applying for loans, and verifying identity when logging into banks or e-government portals.<\/li>\n<li><strong>Credentials: <\/strong>logins, passwords, and one-time 2FA codes.<\/li>\n<li><strong>Biometrics:<\/strong> face scans, fingerprints, and voice samples used to generate deepfakes or bypass two-factor authentication.<\/li>\n<li><strong>Payment details:<\/strong> bank card and cryptocurrency wallet details.<\/li>\n<li>And much more.<\/li>\n<\/ul>\n<p>According to our research, the vast majority (88.5%) of phishing attacks conducted from January through September 2025 targeted online account credentials, and 9.5% were attempts to obtain users\u2019 personal data, such as names, addresses, and dates. Finally, 2% of phishing attacks were focused on stealing bank card details.<\/p>\n<div id=\"attachment_54970\" style=\"width: 1852px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064707\/what-happens-to-data-after-phishing-2-EN.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54970\" class=\"wp-image-54970 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064707\/what-happens-to-data-after-phishing-2-EN.png\" alt=\"Distribution of attacks by type of data being targeted, January\u2013September 2025 \" width=\"1842\" height=\"1150\"><\/a><p id=\"caption-attachment-54970\" class=\"wp-caption-text\">Distribution of attacks by type of data being targeted, January\u2013September 2025<\/p><\/div>\n<h2>What happens to the stolen data next?<\/h2>\n<p>Not all stolen data is directly used by the attackers to transfer money to their own accounts. In fact, the data is seldom used instantly; more commonly, it finds its way onto the shadow market, reaching analysts and data brokers. A typical journey looks something like this.<\/p>\n<h4>1. Bulk sale of data<\/h4>\n<p>Raw data sets are bundled into massive archives and offered in bulk on dark web forums. These dumps often contain junk or outdated information, which is why they\u2019re relatively cheap \u2014 starting at around US$50.<\/p>\n<h4>2. Data sorting and verification<\/h4>\n<p>These archives are purchased by hackers who act as analysts. They categorize datasets and verify the validity of the data by checking if the login credentials work for the specified services, if they are reused on other sites, and if they match any data from past breaches. For targeted attacks, cybercriminals compile a digital dossier. It stores information gathered from both recent and older attacks \u2014 essentially a spreadsheet of data ready to be used in hacks.<\/p>\n<h4>3. Resale of verified data<\/h4>\n<p>The sorted datasets are offered for sale again, now at a higher price \u2014 and not only on the dark web but also on the more familiar Telegram.<\/p>\n<div id=\"attachment_54971\" style=\"width: 702px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064742\/what-happens-to-data-after-phishing-3.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54971\" class=\"size-full wp-image-54971\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/12064742\/what-happens-to-data-after-phishing-3.png\" alt=\"An ad for a Telegram sale of social media account credentials\" width=\"692\" height=\"254\"><\/a><p id=\"caption-attachment-54971\" class=\"wp-caption-text\">An ad for a Telegram sale of social media account credentials<\/p><\/div>\n<p>According to Kaspersky Digital Footprint Intelligence, account prices are driven by a large number of factors: account age, 2FA authentication, linked bank cards, and service userbase. It\u2019s no surprise that the most expensive and in-demand commodity on this market is access to bank accounts and crypto wallets.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"197\"><strong>Category<\/strong><\/td>\n<td width=\"189\"><strong>Price, US$<\/strong><\/td>\n<td width=\"190\"><strong>Average price, US$<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Crypto platforms<\/td>\n<td width=\"189\">60\u2013400<\/td>\n<td width=\"190\">105<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Banks<\/td>\n<td width=\"189\">70\u20132000<\/td>\n<td width=\"190\">350<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">E-government portals<\/td>\n<td width=\"189\">15\u20132000<\/td>\n<td width=\"190\">82.5<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Social media<\/td>\n<td width=\"189\">0.4\u2013279<\/td>\n<td width=\"190\">3<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Messaging apps<\/td>\n<td width=\"189\">0.065\u2013150<\/td>\n<td width=\"190\">2.5<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Online stores<\/td>\n<td width=\"189\">10\u201350<\/td>\n<td width=\"190\">20<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Games and gaming platforms<\/td>\n<td width=\"189\">1\u201350<\/td>\n<td width=\"190\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Global internet portals<\/td>\n<td width=\"189\">0.2\u20132<\/td>\n<td width=\"190\">0.9<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Personal documents<\/td>\n<td width=\"189\">0.5\u2013125<\/td>\n<td width=\"190\">15<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"wp-caption aligncenter\">\n<p class=\"wp-caption-text\">Average account prices in January\u2013September 2025<\/p>\n<\/div>\n<h4>4. Repeat attacks<\/h4>\n<p>Once a cybercriminal purchases a victim\u2019s digital dossier, they can plan their next attack. They might use open-source intelligence to find out where the person works, and then craft a convincing email impersonating their boss. Alternatively, they could hack a social media profile, extract compromising photos, and demand a ransom for their return. However, rest assured that nearly all threatening or extortion emails <a href=\"https:\/\/www.kaspersky.com\/blog\/blackmail-and-scam-in-different-countries\/54724\/\" target=\"_blank\" rel=\"noopener nofollow\">are just a scare tactic by scammers<\/a>.<\/p>\n<p>Cybercriminals also use compromised accounts to send further phishing emails and malicious links to the victim\u2019s contacts. So, if you receive a message asking you to <a href=\"https:\/\/www.kaspersky.com\/blog\/whatsapp-phishing-vote\/54515\/\" target=\"_blank\" rel=\"noopener nofollow\">vote for a niece in a contest<\/a>, lend money, or click on a suspicious link, you have every reason to be wary.<\/p>\n<h2>What to do if your data has been stolen<\/h2>\n<ol>\n<li>First, recall what information you entered on the phishing site. If you provided payment card details, call your bank immediately and have the cards blocked. If you entered a login and password that you use for other accounts, change those passwords right away. A <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a> can help you create and store strong, unique passwords.<\/li>\n<li>Enable two-factor authentication (2FA) wherever possible. For more details on what 2FA is and how to use it, read our <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-two-factor-authentication\/48289\/\" target=\"_blank\" rel=\"noopener nofollow\">guide<\/a>. When choosing a 2FA method, it\u2019s best to avoid SMS, <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">as one-time codes sent via a text can be intercepted<\/a>. Ideally, <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-password-manager-authenticator\/48841\/\" target=\"_blank\" rel=\"noopener nofollow\">use an authenticator app<\/a>, such as <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>, to generate one-time codes.<\/li>\n<li>Check the active sessions (the list of logged-in devices) in your important accounts. If you see a device or IP address you don\u2019t recognize, terminate that session immediately. Then change your password and set up two-factor authentication.<\/li>\n<\/ol>\n<h2>How to guard against phishing<\/h2>\n<ul>\n<li>Don\u2019t click on links in emails or messages without first scanning them with a <a href=\"https:\/\/www.kaspersky.com\/home-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">security solution<\/a>.<\/li>\n<li>If you receive a suspicious email, always check the sender\u2019s address to see if you\u2019ve had any contact with that person before. If someone claims to represent a government authority or company, be sure to compare the domain the email was sent from with the domain of the organization\u2019s official website. No official correspondence should ever come from a free email service.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/blog\/best-authenticator-apps-2022\/43261\/\" target=\"_blank\" rel=\"noopener nofollow\">an authenticator app for two-factor authentication<\/a>.<\/li>\n<li>Create <a href=\"https:\/\/www.kaspersky.com\/blog\/international-password-day-2025\/53355\/\" target=\"_blank\" rel=\"noopener nofollow\">hack-resistant passwords<\/a>. Our research shows that hackers can crack almost <a href=\"https:\/\/www.kaspersky.com\/blog\/password-can-be-hacked-in-one-hour\/51469\/\" target=\"_blank\" rel=\"noopener nofollow\">60% of all passwords in the world in less than an hour<\/a>. Alternatively, <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\">consider switching to passkeys<\/a>, which offer much stronger account protection, but keep in mind that <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-2\/53724\/\" target=\"_blank\" rel=\"noopener nofollow\">they come with their own caveats<\/a>.<\/li>\n<li>Remember: using the same password for multiple services is a <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener nofollow\">critical mistake<\/a>. This is exactly what malicious actors exploit. Even if you\u2019ve never fallen for a phishing scam, your passwords and data can still <a href=\"https:\/\/www.kaspersky.com\/blog\/top-five-data-breaches-in-history\/52040\/\" target=\"_blank\" rel=\"noopener nofollow\">end up in data breaches<\/a>, as cyberattackers target not just individuals but entire companies. This year, the Identity Theft Resource Center has already recorded over two thousand data breaches. To minimize the risks, create a unique and strong password for every account. You don\u2019t have to \u2014 and actually can\u2019t \u2014 memorize them all. It\u2019s better to use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a>, which generates and securely stores complex passwords, syncs them across all your devices, auto-fills them on websites and in apps, and <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-international-password-day-2024\/51095\/\" target=\"_blank\" rel=\"noopener nofollow\">alerts you if any of your credentials appear in a known data breach<\/a>.<\/li>\n<\/ul>\n<blockquote><p>More on phishing and scams:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-phishing-and-scams\/54445\/\" target=\"_blank\" rel=\"noopener nofollow\">How phishers and scammers use AI<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-deal-with-email-phishing\/53990\/\" target=\"_blank\" rel=\"noopener nofollow\">Phishing 101: what to do if you get a phishing email<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/blackmail-and-scam-in-different-countries\/54724\/\" target=\"_blank\" rel=\"noopener nofollow\">Email extortion: how scammers use blackmail<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-and-scam-in-telegram-2025\/54090\/\" target=\"_blank\" rel=\"noopener nofollow\">Telegram scams with bots, gifts, and crypto<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">Et cetera<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>We follow the trail of a phishing attack to break down, step-by-step, what happens to the data stolen from users.<\/p>\n","protected":false},"author":2710,"featured_media":54974,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[2672,527,961,76,726],"class_list":{"0":"post-54968","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-accounts","9":"tag-hacks","10":"tag-leaks","11":"tag-phishing","12":"tag-scam"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/54968\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-happens-to-data-after-phishing\/29959\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/25028\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-happens-to-data-after-phishing\/29836\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/28870\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-happens-to-data-after-phishing\/30390\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-happens-to-data-after-phishing\/41100\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-happens-to-data-after-phishing\/14138\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-happens-to-data-after-phishing\/23500\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-happens-to-data-after-phishing\/30126\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-happens-to-data-after-phishing\/35746\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-happens-to-data-after-phishing\/35376\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2710"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54968"}],"version-history":[{"count":9,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54968\/revisions"}],"predecessor-version":[{"id":54978,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54968\/revisions\/54978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54974"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}