This post may contain affiliate links, please read our affiliate disclosure to learn more.
Account Harvesting: What Drives These Attacks?

Account Harvesting: What Drives These Attacks?

Author
 By Charles Joseph | Cybersecurity Researcher
Clock
 Published on December 15th, 2023

Account Harvesting is a process where attackers try to gather or ‘harvest’ user account data, such as usernames, email addresses, or passwords. This data can be collected in various ways, with the most common methods being hacking, phishing attacks, or using software that records keystrokes. Once they have this information, attackers can attempt to gain unauthorized access to the user’s accounts.

Account Harvesting Examples

1. Phishing

Phishing is a common method used for account harvesting. In a typical phishing scenario, a person might receive an email disguised as an official communication from a trusted institution. This could be a bank, credit card company, or online service provider.

NordVPN 67% off + 3-month VPN coupon

Stay One Step Ahead of Cyber Threats

Want to Be the Smartest Guy in the Room? Get the Latest Cybersecurity News and Insights.
We respect your privacy and you can unsubscribe anytime.

The email may contain an urgent message asking the recipient to update their account details to continue using the service, or it might warn them about a supposed security threat. A link in the email then directs the user to a dummy website that looks identical or very similar to the actual company website.

Unsuspecting users might enter their login credentials into this false portal, essentially handing over their information to the attacker. This information, which includes usernames, email addresses, and passwords, are then harvested and can be used for unauthorized access.

2. Key Loggers

A key logger is a type of surveillance technology often used in account harvesting. Key loggers are malicious software or hardware devices which covertly record, or ‘log’, the keystrokes made by a user on their keyboard.

These logs are then transmitted back to the attacker, often via an internet connection. Key loggers can potentially record all types of sensitive information, including usernames, passwords, credit card numbers, and other private data that a user enters into their device.

Because key logger software can be difficult to detect, it can remain active for an extended period of time without the user’s knowledge. This allows attackers to gather a large amount of data. Once harvested, this data can be used to gain unauthorised access to the victim’s accounts, commit identity theft, or for other illegal purposes.

3. Data Breach

Data breaches occur when an unauthorized person or group gains access to a database containing confidential user information. This data can include usernames, passwords, email addresses, and other sensitive information. A data breach can happen in numerous ways, whether it’s through hacking, the exploitation of vulnerabilities in website security, or even through physical theft of storage devices containing this data.

Once the data is acquired, it can be used for account harvesting. Cybercriminals can compile this information and sell it, or worse, use the stolen credentials themselves. Commonly, they attempt to gain unauthorized access to the accounts linked to the harvested data, causing severe privacy issues and potential financial damage to the victims.

It is also possible that cybercriminals will try using the same credentials on multiple platforms, in hopes that the victims have reused their passwords, a practice that unfortunately is all too common despite advice to the contrary. This highlights the importance of using unique passwords for each separate online account one uses, and regularly updating them as a measure of precaution.

Conclusion

Account harvesting is a serious threat in the digital world that involves the illicit collection of user data such as usernames, passwords, and email addresses. Whether through phishing, key loggers, or data breaches, the information obtained can lead to unauthorized account access, causing significant privacy concerns and potential financial damage to users.

Key Takeaways

  • Account harvesting involves collecting sensitive user data, typically usernames and passwords, in unauthorized ways.
  • This harvested data can lead to unapproved account access and potential violation of user’s privacy.
  • Phishing, key loggers, and data breaches are common methods used for account harvesting.
  • Phishing involves sending deceptive emails in an attempt to trick users into revealing sensitive account information.
  • Key loggers are malicious software or hardware that track a person’s keystrokes to capture private information.
  • Data breaches occur when attackers gain unauthorized access to a database containing user data, which can then be used for account harvesting.

Related Questions

1. How can I protect myself from phishing attacks?

Be wary of emails asking for personal information, especially from unknown sources. Always double-check the sender’s email address, and never click on suspicious links or download attachments. It’s also wise to install and regularly update antivirus software as an added layer of protection.

2. What can I do to protect myself from keyloggers?

Installing a reliable and updated antivirus program is key. It’s also wise to regularly change your passwords and use a virtual or on-screen keyboard when entering sensitive information, especially on public computers.

3. In case of a data breach, what should I do?

If you suspect a data breach, immediately change your passwords and notify the affected company. Monitor your financial accounts for any unusual activity and consider using a credit monitoring service to alert you of potential identity theft.

4. How can I find out if my information has been harvested?

There are several online services, like ‘Have I Been Pwned’, that allow you to check if your email has been involved in a data breach. Watch for any unusual activity on your accounts and report any suspicious emails to your service provider.

5. Are there laws against account harvesting?

Yes, many countries have laws against unauthorized access, use, or distribution of someone else’s personal data. However, given the nature of the internet, tracking violations and prosecuting offenders can be challenging.

QUOTE:
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional
Scroll to Top