Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
MichaelCallahan

Why Your Twitter Account May Be More Valuable Than Your Credit Card

by Juniper Employee ‎03-24-2014 09:01 PM - edited ‎03-25-2014 01:19 PM

In any traditional market, the yield or scarcity of a product influences its price. A recent report from Juniper Networks and The RAND Corporation looked at the economic maturity of the cyber black market – and it found product prices in this illicit market are no different.

 

What was surprising is that information that traditionally fetched a high price on the black market is decreasing in value, making way for new, high-priced items. According to the study, Twitter accounts can cost more to purchase than a stolen credit card because an individual’s account credentials potentially have a greater yield.

 

Traditionally, credit card information was the currency of the black market. It demanded a high price, ranging from $20-$40 on average. However, high-profile breaches have created a recent influx of available credit card data online. As a result the scarcity and value of the stolen information is decreasing. During a large credit card breach, the market becomes flooded with data causing prices to drop from $20 per record to $0.75 per record in a short amount of time.

 
twitter blog.png

Social media and other online accounts are now becoming more valuable. Although prices range widely, RAND found hacked accounts can be worth anywhere from $16 to $325+ depending on the account type.

 

So why is an individual’s Twitter or other online account information potentially more valuable to criminals than their credit card?

 

It typically comes down to a more sophisticated play, with leveraged data value:

  • Depth: Social media and other credentials include usernames and passwords, which can often be used as an entry point to launch attacks on that person’s accounts on a number of other sites. Given the number of people that tend to use the same username and passwords, hacking one account can often yield other valuable information such as online banking or e-commerce accounts. By stealing Joe Smith’s account information on one site, the criminal might gain access to his information on 10 sites.
  • Reach: An individual’s stolen account information can be used to spear-phish the accounts of friends, family and co-workers for additional financial gain.

 

So what can people to do protect themselves?

The most critical rule of thumb is to use different passwords for each site that contains personal or financial information. For example, one password for your bank, another for your investments. It is also important to be wary of opening emails or clicking on links from people they don’t know. Finally, monitoring personal and financial accounts closely will enable individuals to identify and report fraudulent activity.

 

Post a Comment
Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.