Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case

08/01/2023
by   Svetlana Abramova, et al.
0

Media reports show an alarming increase of data breaches at providers of cybersecurity products and services. Since the exposed records may reveal security-relevant data, such incidents cause undue burden and create the risk of re-victimization to individuals whose personal data gets exposed. In pursuit of examining a broad spectrum of the downstream effects on victims, we surveyed 104 persons who purchased specialized devices for the secure storage of crypto-assets and later fell victim to a breach of customer data. Our case study reveals common nuisances (i.e., spam, scams, phishing e-mails) as well as previously unseen attack vectors (e.g., involving tampered devices), which are possibly tied to the breach. A few victims report losses of digital assets as a form of the harm. We find that our participants exhibit heightened safety concerns, appear skeptical about litigation efforts, and demonstrate the ability to differentiate between the quality of the security product and the circumstances of the breach. We derive implications for the cybersecurity industry at large, and point out methodological challenges in data breach research.

READ FULL TEXT

page 3

page 10

page 11

research
01/09/2023

Case study Vanderbilt University Medical Center Data Chaos

The healthcare industry is growing rapidly in the United States because ...
research
12/12/2017

IT Risk Assessment for Group6 Healthcare Clinic Report

Information security and privacy in the healthcare sector is an issue of...
research
09/01/2023

SoK: Safer Digital-Safety Research Involving At-Risk Users

Research involving at-risk users – that is, users who are more likely to...
research
05/30/2019

The Security Implications of Data Subject Rights

Data protection regulations give individuals rights to obtain the inform...
research
10/27/2021

Teardown and feasibility study of IronKey – the most secure USB Flash drive

There are many solutions for protecting user data on USB Flash drives. H...
research
05/06/2021

A Cybersecurity Guide for Using Fitness Devices

The popularity of wearable devices is growing exponentially, with consum...

Please sign up or login with your details

Forgot password? Click here to reset