Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Identity Can Sell On the Black Market For Somewhere Between $1-$500

b2ap3_thumbnail_black_market_dark_web_400.jpgOctober is Cybersecurity Awareness Month! With the number of data breaches growing every day, one has to wonder what hackers do with all of the information they steal. In some cases, the hackers go public with the information, as seen by the recent Ashley Madison and Sony hacks. Other times, however, hackers just want to use the information as a bargaining chip on the black market. The theft of passwords, usernames, Social Security numbers, and other sensitive information is a very lucrative market for hackers.

Hackers can’t just sell your credentials through traditional outlets, though. They have to use a special network designed for access across the anonymity network, Tor. It’s within this Dark Web that most information that’s stolen online is sold. The information that’s most-often stolen consists of personal identifiable information, as well as financial data. Hackers typically target healthcare, government, retail, and education industries, but they aren’t terribly picky about which industries they hack. Chances are that if you store sensitive information (and you do), you’re a potential target for hackers.

As a business owner, the responsibility of protecting your organization’s network from hackers and data theft falls on you. Even if you might not initially think your data is worth stealing, you’ll find that regardless, hackers will still try to take advantage of any organization that neglects their cybersecurity. If you don’t find your data valuable, hackers would be more than happy to steal it and make a profit off of it, putting you in a rather precarious situation. Here are some figures provided by ZDNet as to just how much specific credentials, accounts, and other sensitive information can go for on the Dark Web.

  • Mobile accounts in the United States can be sold for as little as $14 apiece.
  • PayPal and eBay accounts that have a significant amount of transaction history can be sold for around $300 each.
  • Supposedly, Uber accounts are in high demand.
  • Bank account credentials can sell for anywhere between $200 and $500 apiece, depending on how much cash is actually stored in them.
  • As you might guess, credit card information is in high demand. In fact, it’s almost comical how much thought is put into the process of selling a credit card number. According to ZDNet, the price varies drastically depending on supply and demand, as well as whether or not they’ll actually work and how much the buyer can get out of the card before it’s reported and deactivated. Most credit card information is sold in bulk to reduce the unit price.
  • Personally identifiable information is sold at $1 per line of information; in other words, someone could purchase your full legal name, Social Security number, address, date of birth, and more, for the price of a meal at a fast food joint. This is more than enough info to commit identity fraud.
  • Full credit reports can be purchased for $25 apiece. Other documents, like passports and driver’s licenses, can be sold for anywhere between $10 and $35 per document.

As you can clearly see, hackers take their data theft very seriously, and so should you. Allowing hackers to infiltrate your network and steal sensitive records could result in severe legal ramifications. You need to integrate a security solution that helps to keep hackers out of your network and away from your data.

To protect your organization, you want to integrate a comprehensive security solution that’s designed to keep threats out and suspicious activity away from your network. A Unified Threat Management (UTM) solution is capable of providing a firewall, antivirus, spam blocking, and a content filtering solution that’s designed with the safety of your organization in mind. Give us a call at (518) 203-2110 to learn more.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 05 February 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Gmail Ransomware Hardware Microsoft Office Office Backup Apps Operating System Business Continuity Disaster Recovery Communication The Internet of Things Hacking Social Media WiFi Bandwidth Facebook Managed Service Provider Outlook Firewall Smartphones Content Filtering Cybercrime Wireless Technology Android Website Apple Best Practice Employer-Employee Relationship Alert Two-factor Authentication History Networking Data storage Small Business Phishing Data Windows App Experience Mobile Computing Big Data communications Safety Unified Threat Management Mobile Device Management Money Quick Tips Network Society Sports Search User Hard Drives Google Wallet Writing Spam Running Cable Remote Computing Shortcut Information Technology Windows 8 Internet of Things DDoS Heating/Cooling Word Hosted Solution Windows XP IT Services Artificial Intelligence Documents Tech Support Compliance Business Management Drones Retail Social Printer Browser Competition Wireless Presentation Entrepreneur Managed IT services Virtual Desktop Unified Communications Securty Domains Document Management Encryption VoIP Hacker Law Enforcement Bluetooth SaaS Proactive IT Automation Cortana Application Customer Service Network Congestion Memory Save Money Music Deep Learning Router BDR Cryptocurrency Laptop Office 365 Vendor Management IBM Analytics Google Docs Saving Money Education Cleaning Holiday Lithium-ion battery intranet Black Market Monitors YouTube Processors Staffing Office Tips LiFi BYOD Downtime Social Networking Public Speaking Passwords Displays Streaming Media Help Desk Disaster IP Address Virtualization Micrsooft Visible Light Communication Government Business Growth End of Support Data Management Recovery Augmented Reality Keyboard Robot Advertising
QR-Code