Home Crypto News Crypto Hacks Study Reveals Extent of Sensitive Data Leaks in Cyberattacks, Including Crypto Keys, With 90% of Data Containing Financial Records

Study Reveals Extent of Sensitive Data Leaks in Cyberattacks, Including Crypto Keys, With 90% of Data Containing Financial Records

0
Study Reveals Extent of Sensitive Data Leaks in Cyberattacks, Including Crypto Keys, With 90% of Data Containing Financial Records

A report by cybersecurity firm Lab 1 has exposed how attackers are siphoning off key financial records and crypto keys from businesses and individuals. 

Published this month, the study analysed 141 million files from 1,297 breach incidents. It shows that nearly all attacks now target unstructured data to fuel fraud and ransomware.

Massive Data Exposure

Lab 1’s “Anatomy of a Breach” is the largest content‑level analysis of leaked datasets to date. The firm found that 93 % of incidents contained financial information. 

Half of the breaches exposed U.S. Social Security Numbers. On average, each leaked file held 54 email addresses. More than a third, or 36 %, included IBAN bank codes.

Researchers warn that cybercriminals are acting like data scientists. They piece together scattered files, emails, and internal reports to map out weak spots in an organisation. 

“Unstructured data cannot be ignored,” said Lab 1 analysts. They note that credentials and supplier messages can be joined to build a full picture of how a business operates.

Breach Weaponization

The report emphasises that understanding what was taken is as vital as understanding that it occurred. Threat actors extract stolen documents for valuable data. 

These are financial projections, account passwords, and crypto keys. Using such information, they mount more targeted fraud or ransomware assaults.

Also Read: Crypto Investigators Warn Crypto Users of Fake Aave Site Topping Google Search, Details Inside

Threat actors these days investigate cloud servers, third-party suppliers, and abandoned IT assets. They are looking for any document that might provide insight into an organisation’s operations. 

Lab 1 indicates that this increasing sophistication renders old security scans inadequate. Businesses need to map all their data and track access on an ongoing basis.

Latest Credential Flood

Last month saw one of the biggest credential leaks ever recorded. Cybernews researchers say more than 16 billion login details from Apple, Google, Facebook, Telegram, and GitHub appeared online. 

This flood came from infostealer malware, credential stuffing, and hidden breaches dating back to early 2024.

Danger for Crypto Users

Some leaked sets held as many as 3.5 billion entries. They included session cookies and tokens that can grant instant access to user accounts. Experts warn that crypto holders face extra risk since stolen keys can drain wallets in seconds.

Among the breached datasets was one tied to Telegram with 60 million records. Another, linked to Russian operators, contained over 455 million entries. The scale and fresh nature of these leaks point to modern malware, not just recycled lists.

Implications for Businesses

The findings show that a single breach can ripple through supply chains. A weak link at a vendor or partner can expose critical files across multiple firms. 

Lab 1 urges companies to audit every corner of their digital footprint. They must hard‑lock forgotten cloud accounts and encrypt sensitive files.

Also Read: Bitcion ATM Bitcoin Depot Alerts 27,000 Users To Last Year’s Data Breach

LEAVE A REPLY

Please enter your comment!
Please enter your name here