{"id":30579,"date":"2024-06-11T20:00:49","date_gmt":"2024-06-11T20:00:49","guid":{"rendered":"https:\/\/radiantmedia.io\/?p=30579"},"modified":"2024-06-11T20:00:50","modified_gmt":"2024-06-11T20:00:50","slug":"the-mystery-surrounding-an-alleged-data-breach-by-a-data-broker","status":"publish","type":"post","link":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/?p=30579","title":{"rendered":"The Mystery Surrounding An Alleged Data Breach By A Data Broker"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Since April, a hacker with a history of selling stolen data has claimed a data breach of billions of records affecting at least 300 million people from a US data broker, making it one of the year&#8217;s greatest reported data breaches.<\/strong><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>The data, as seen by TechCrunch, looks to be somewhat authentic \u2013 albeit imprecise. The stolen data, which was sold on a well-known cybercrime site, purportedly stretches back years and contains U.S. persons&#8217; full names, home address histories, and Social Security numbers \u2013 information that data brokers frequently sell.<\/p>\n\n\n\n<p>However, determining the source of the alleged data theft has been difficult; this is due to the nature of the data broker sector, which collects personal information from a variety of sources with little or no quality control.<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>READ MORE: <a href=\"https:\/\/radiantmedia.io\/2024\/05\/30\/the-zero-click-era-requires-interesting-data-partnerships\/\">The Zero-Click Era Requires Interesting Data Partnerships.<\/a><\/strong><\/p>\n\n\n\n<p>According to the hacker, the purported data broker is National Public Data, which claims to be &#8220;one of the biggest providers of public records on the Internet.&#8221;<\/p>\n\n\n\n<p>On its official website, National Public Data claimed to sell access to several databases: a &#8220;People Finder&#8221; where customers can search by Social Security number, name and date of birth, address, or telephone number; a database of U.S. consumer data &#8220;covering over 250 million individuals;&#8221; a database containing voter registration data that contains information on 100 million U.S. citizens; a criminal records database, and several others.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/ef36c2e67657129cadc352d6a841a9af-1024x683-1.jpg\" alt=\"\" class=\"wp-image-30587\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/ef36c2e67657129cadc352d6a841a9af-1024x683-1.jpg 1024w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/ef36c2e67657129cadc352d6a841a9af-1024x683-1-980x654.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/ef36c2e67657129cadc352d6a841a9af-1024x683-1-480x320.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>The malware research organization vx-underground announced on X (previously Twitter) that they had evaluated the whole stolen information and could &#8220;confirm the data present in it is real and accurate.&#8221;<\/p>\n\n\n\n<p>&#8220;We searched up several individuals who consented to having their information looked up,&#8221; the organization wrote, adding that they were able to locate those people&#8217;s information, including names, address histories dating back more than three decades, and Social Security numbers.<\/p>\n\n\n\n<p>&#8220;It also helped us find their parents and nearest siblings. We were able to identify someone&#8217;s (sic) parents, deceased relatives, uncles, aunts, and cousins,&#8221; vx-underground stated.<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>READ MORE: <a href=\"https:\/\/radiantmedia.io\/2024\/05\/21\/metrics-and-measurement-the-data-behind-ctv-integration-with-digital-media\/\">Metrics And Measurement: The Data Behind CTV Integration With Digital Media<\/a><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"263\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/1520085382126.jpeg\" alt=\"\" class=\"wp-image-30588\" style=\"width:345px;height:auto\" srcset=\"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/wp-content\/uploads\/2024\/06\/1520085382126.jpeg 460w, http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/wp-content\/uploads\/2024\/06\/1520085382126-300x172.jpeg 300w\" sizes=\"auto, (max-width: 460px) 100vw, 460px\" \/><\/figure><\/div>\n\n\n<p>In our review of a smaller sample of five million records, we discovered reams of names and addresses that match corresponding public records, as well as some data that doesn&#8217;t always make sense, such as email addresses with different names that have no obvious bearing on the rest of the associated individual&#8217;s data. Some documents contained alleged information about well-known individuals, including a former US president&#8217;s personal information.<\/p>\n\n\n\n<p>TechCrunch provided USDoD, the hacker selling the data, with the identities of eight persons who granted their authorization in an attempt to confirm that the hacker indeed has legitimate data. The hacker did not return any information for the eight individuals.<\/p>\n\n\n\n<p>TechCrunch also contacted a hundred people whose phone numbers and email addresses were in the sample. Only one guy answered, confirming that some of his supposed stolen data was correct, but not all.<\/p>\n\n\n\n<p>Going straight to the claimed source of the data theft yielded little information.<\/p>\n\n\n\n<p style=\"font-size:16px\"><strong>READ MORE: <a href=\"https:\/\/radiantmedia.io\/2024\/05\/02\/chatgpt-now-maintains-chat-history-even-if-you-have-opted-out-of-sharing-training-data\/\">ChatGPT Now Maintains Chat History, Even If You Have Opted Out Of Sharing Training Data<\/a><\/strong><\/p>\n\n\n\n<p>Despite many attempts to reach the company, neither National Public Data nor its founder and CEO, Salvatore Verini, have answered. After TechCrunch contacted National Public Data last week, the company removed sections from its website that contained information about the databases to which it sells access.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/shutterstock_577970596-scaled-1-1024x682.jpg\" alt=\"\" class=\"wp-image-30590\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/shutterstock_577970596-scaled-1-980x653.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2024\/06\/shutterstock_577970596-scaled-1-480x320.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Not all data breaches alleged by hackers, particularly those published on hacking forums, are legitimate. That&#8217;s why TechCrunch and other cybersecurity reporters frequently spend significant amounts of time attempting to verify a data leak, which can occasionally yield inconclusive results.<\/p>\n\n\n\n<p>However, this purported breach by a data broker looks to be an exception, in part because some of the material appears legitimate and has already been confirmed.<\/p>\n\n\n\n<p>The expansion and commoditization of personal data in the data broker sector also makes it more difficult to pinpoint the source of data breaches. Even if this particular data breach goes uncovered, it demonstrates once again that the data broker sector is out of control and poses serious privacy risks to ordinary citizens.<\/p>\n\n\n\n<p>We couldn&#8217;t completely solve the mystery of this data leak, but there was enough information to document our verification efforts. One thing is evident. As long as data brokers collect personal information, there is a chance that the data will leak.<\/p>\n\n\n\n<p><a href=\"https:\/\/techcrunch.com\/2024\/06\/11\/the-mystery-of-an-alleged-data-brokers-data-breach\/\">Source<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center has-vivid-red-color has-text-color has-link-color has-medium-font-size wp-elements-ff9e2db4a6c4c5f6c36606f49d21fb44\"><em><strong>Radiant TV, offering to\u00a0elevate your entertainment game!\u00a0Movies, TV series, exclusive interviews, music, and more\u2014download now on various devices, including iPhones, Androids, smart TVs, Apple TV, Fire Stick, and more.<\/strong><\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-is-layout-94bc23d7 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"993\" src=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-1024x993.jpg\" alt=\"\" class=\"wp-image-22795\" style=\"width:363px;height:auto\" srcset=\"http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-980x950.jpg 980w, http:\/\/radiantmedia.io\/wp-content\/uploads\/2023\/11\/IMG-7143-480x465.jpg 480w\" sizes=\"auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1024px, 100vw\" \/><\/figure>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\"\/>\n\n\n\n<ul class=\"wp-block-social-links aligncenter has-huge-icon-size is-content-justification-center is-layout-flex wp-container-core-social-links-is-layout-16018d1d wp-block-social-links-is-layout-flex\"><li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/teamradiant\/mycompany\/?viewAsMember=true\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-facebook  wp-block-social-link\"><a href=\"https:\/\/www.facebook.com\/RadiantTechnologiesLV\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-instagram  wp-block-social-link\"><a href=\"https:\/\/www.instagram.com\/radianttechnologieslv\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12,4.622c2.403,0,2.688,0.009,3.637,0.052c0.877,0.04,1.354,0.187,1.671,0.31c0.42,0.163,0.72,0.358,1.035,0.673 c0.315,0.315,0.51,0.615,0.673,1.035c0.123,0.317,0.27,0.794,0.31,1.671c0.043,0.949,0.052,1.234,0.052,3.637 s-0.009,2.688-0.052,3.637c-0.04,0.877-0.187,1.354-0.31,1.671c-0.163,0.42-0.358,0.72-0.673,1.035 c-0.315,0.315-0.615,0.51-1.035,0.673c-0.317,0.123-0.794,0.27-1.671,0.31c-0.949,0.043-1.233,0.052-3.637,0.052 s-2.688-0.009-3.637-0.052c-0.877-0.04-1.354-0.187-1.671-0.31c-0.42-0.163-0.72-0.358-1.035-0.673 c-0.315-0.315-0.51-0.615-0.673-1.035c-0.123-0.317-0.27-0.794-0.31-1.671C4.631,14.688,4.622,14.403,4.622,12 s0.009-2.688,0.052-3.637c0.04-0.877,0.187-1.354,0.31-1.671c0.163-0.42,0.358-0.72,0.673-1.035 c0.315-0.315,0.615-0.51,1.035-0.673c0.317-0.123,0.794-0.27,1.671-0.31C9.312,4.631,9.597,4.622,12,4.622 M12,3 C9.556,3,9.249,3.01,8.289,3.054C7.331,3.098,6.677,3.25,6.105,3.472C5.513,3.702,5.011,4.01,4.511,4.511 c-0.5,0.5-0.808,1.002-1.038,1.594C3.25,6.677,3.098,7.331,3.054,8.289C3.01,9.249,3,9.556,3,12c0,2.444,0.01,2.751,0.054,3.711 c0.044,0.958,0.196,1.612,0.418,2.185c0.23,0.592,0.538,1.094,1.038,1.594c0.5,0.5,1.002,0.808,1.594,1.038 c0.572,0.222,1.227,0.375,2.185,0.418C9.249,20.99,9.556,21,12,21s2.751-0.01,3.711-0.054c0.958-0.044,1.612-0.196,2.185-0.418 c0.592-0.23,1.094-0.538,1.594-1.038c0.5-0.5,0.808-1.002,1.038-1.594c0.222-0.572,0.375-1.227,0.418-2.185 C20.99,14.751,21,14.444,21,12s-0.01-2.751-0.054-3.711c-0.044-0.958-0.196-1.612-0.418-2.185c-0.23-0.592-0.538-1.094-1.038-1.594 c-0.5-0.5-1.002-0.808-1.594-1.038c-0.572-0.222-1.227-0.375-2.185-0.418C14.751,3.01,14.444,3,12,3L12,3z M12,7.378 c-2.552,0-4.622,2.069-4.622,4.622S9.448,16.622,12,16.622s4.622-2.069,4.622-4.622S14.552,7.378,12,7.378z M12,15 c-1.657,0-3-1.343-3-3s1.343-3,3-3s3,1.343,3,3S13.657,15,12,15z M16.804,6.116c-0.596,0-1.08,0.484-1.08,1.08 s0.484,1.08,1.08,1.08c0.596,0,1.08-0.484,1.08-1.08S17.401,6.116,16.804,6.116z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Instagram<\/span><\/a><\/li>\n\n<li class=\"wp-social-link wp-social-link-twitter  wp-block-social-link\"><a href=\"https:\/\/twitter.com\/RadiantTechlv\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Since April, a hacker with a history of selling stolen data has claimed a data breach of billions of records affecting at least 300 million people from a US data broker, making it one of the year&#8217;s greatest reported data breaches. The data, as seen by TechCrunch, looks to be somewhat authentic \u2013 albeit imprecise. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":30586,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"1080","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-30579","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-news"],"aioseo_notices":[],"_links":{"self":[{"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/posts\/30579","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30579"}],"version-history":[{"count":2,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/posts\/30579\/revisions"}],"predecessor-version":[{"id":30591,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/posts\/30579\/revisions\/30591"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=\/wp\/v2\/media\/30586"}],"wp:attachment":[{"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30579"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ec2-34-197-49-85.compute-1.amazonaws.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}