CyberCon 2023 22
CyberCon 2023 22
X / 2023
Abstract
In the following article we will present how data theft can have serious effects on the personal
life of citizens and users of certain applications, and in general on public institutions and countries.
In the following we will find out how these data can end up in the hands of hackers, for what purpose
they are used and what are the legal implications. In the end we will analyze how the authorities try
to limit this phenomenon and how each of us can take protective measures for this purpose.
1. Introduction
In order to be able to understand how data leakage occurs, we must have a well-structured
system in which information is formed and stored. Thus, cyberspace is the virtual environment,
generated by the informational content processed, stored or transmitted, as well as by the processes
and operations carried out by the users of the virtual environment, the human resource produces data
that passes through different applications having the storage center in several places (Datacenters,
PCs, Laptops, Mobile, Cloud).
Another concept related to data leakage is that of cybersecurity. It represents the state of
normality resulting from the application of a set of proactive and reactive measures that ensure the
confidentiality, availability, integrity, non-repudiation, authenticity of information in electronic
format, of public or private resources and services, in cyberspace. When there is no timely response
against threats to cyber infrastructures or human errors occur, data beaches can occur.
A Personal Data Breach is any breach of security that results in the accidental or unlawful
destruction, loss, alteration or unauthorized disclosure of Personal Data or access to Personal Data.
This includes violations due to accidental and intentional causes. It also means that a breach involves
more than just the loss of personal data. A personal data breach can be broadly defined as a security
incident that compromises the confidentiality, integrity, or availability of personal data. In other
words, a personal data breach occurs whenever personal data is accidentally lost, destroyed,
corrupted, or disclosed. If someone accesses or discloses your data without your permission or where
the data is not available and the unavailability would have a material adverse effect on the individual
[1].
When the attacker creates a threat by exploiting vulnerabilities, it leads to risks. These risks can
affect the assets causing exposure and thus the data breach has a high chance of occurring. Meanwhile
a data leak is caused when an internal source exposes information. Criminals can use a variety of
methods to try and break into a network, for example DDoS, Trojans, Malware, disruption via
servers/network. Data leaks occur because of an internal problem. They don't usually happen because
170
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
of a cyberattack. This is encouraging news for organizations since they can proactively detect and
remediate data leaks before they are discovered by criminals [2].
Let's review some of the most common causes of data leaks.
• Bad infrastructure: Misconfigured or unpatched infrastructure can unintentionally
expose data. Having the wrong settings or permissions, or an outdated software version
may seem innocent, but it can potentially expose data. Organizations should ensure that
all infrastructure is carefully configured to protect data.
• Social engineering scams: While data breaches are the result of a cyberattack,
criminals often use similar methods to create a data leak. Then the criminal will exploit
the data leak to launch other cyberattacks. For example, phishing emails may
successfully gain access to a person's login credentials, which could result in a bigger
data breach.
• Poor password policies: People tend to use the same password for multiple accounts
because it's easier to remember it. But if a credential stuffing attack happens, it could
expose several accounts. Even something as simple as having login credentials written
in a notebook could lead to a data leak.
• Lost devices: If an employee loses a device with a company’s sensitive information, it
qualifies as a potential data breach. If a criminal gains access to the device's content, it
could lead to identity theft or a data breach.
• Software vulnerabilities: Software vulnerabilities can easily turn into a huge
cybersecurity issue for organizations. It's possible for criminals to take advantage of
outdated software or zero-day exploits and turn it into a variety of security threats.
• Old data: As businesses grow and employees come and go, companies can lose track
of data. System updates and infrastructure changes can accidentally expose that old data
[2].
For us to understand the complexity of the hacking world, we have to begin with the beginning
and that is, to understand what a hacker is, how does hacking work, the type of hackers that are
currently navigating the web and what are the targets of these so-called “cyberpunks” or hackers [3].
171
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
• Many hackers aim to exploit either technical or social weaknesses to breach defenses.
Technical weaknesses may include vulnerabilities in software or other exploitable weak
spots. To exploit social weaknesses, hackers may attempt to manipulate social outcomes
through false pretenses, such as impersonating a co-worker or other individual to gain
financial or login information. Hackers may also use their technical skills to install
dangerous malware, steal or destroy data, or disrupt an organization's services.
• Hackers of all types participate in forums to exchange hacking information and
tradecraft. There are numerous hacker forums where ethical hackers can discuss or ask
questions about hacking. Many of these hacker forums offer technical guides with step-
by-step instructions on hacking.
• In contrast, dark web sites often host forums and markets for threat actors or criminal
hackers, which serve as a means of offering, trading and seeking out unlawful hacking
services.
Scripts, and even specially tailored software programs, are frequently used by criminals who
don't usually have the technical skills to penetrate corporate networks. For the purpose of obtaining
information on the functioning of the target system, this software can have access to network data.
These scripts can be found on the Internet, for anyone who is typically an entry level hacker. Hackers
with limited skills are sometimes called script kiddies, referring to their need to use malicious scripts
and their inability to create their own code. Advanced malicious hackers might study these scripts
and then modify them to develop new methods [3].
172
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
hat hackers may use illegal or extreme courses of action. Often, red hat hackers will
deploy cyber-attacks toward the systems of threat actors.
• Blue hat hackers, also known as vengeful hackers, use hacking as a social weapon.
Frequently, it is used as a means for revenge against a person, employer or other
organization. Hackers who post personal and confidential data online to ruin reputations
or attempt to gain unauthorized access to email and social media accounts are classified
as blue hats.
• Script kiddies are amateur, inexperienced hackers who attempt to use pre-written scripts
in their hacking efforts. Often, these are fledgling hacking enthusiasts who cause little
damage.
• Hacktivists are organizations of hackers that use cyber-attacks to affect politically
motivated change. The purpose is to bring public attention to something the hacktivist
believes might be a violation of ethics or human rights. Hacktivism attacks may attempt
to reveal evidence of wrongdoing by publicizing private communications, images or
information [3].
173
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
Because cybercrimes have become more and more present in every person’s life and they can
even affect states, international organizations are trying to regulate this problem.
Thus, in 1997, G8 released a Ministers' Communiqué that includes an action plan and principles
to combat cybercrime and protect data and systems from unauthorized impairment. G8 also mandates
that all law enforcement personnel must be trained and equipped to address cybercrime, and
designates all member countries to have a point of contact on a 24 hours a day/7 days a week basis
[5].
In 1990 the UN General Assembly adopted a resolution dealing with computer crime
legislation. In 2000 the UN GA adopted a resolution on combating the criminal misuse of information
technology. In 2002 the UN GA adopted a second resolution on the criminal misuse of information
technology [5].
The International Telecommunication Union (ITU), as a specialized agency within the United
Nations, plays a leading role in the standardization and development of telecommunications and
cybersecurity issues. The ITU was the lead agency of the World Summit on the Information Society
(WSIS). In 2003, Geneva Declaration of Principles and the Geneva Plan of Action were released,
which highlights the importance of measures in the fight against cybercrime. In 2005, the Tunis
Commitment and the Tunis Agenda were adopted for the Information Society [5].
The Council of Europe is an international organisation focusing on the development of human
rights and democracy in its 47 European member states.
In 2001, the Convention on Cybercrime, the first international convention aimed at Internet
criminal behaviors, was co-drafted by the Council of Europe with the addition of USA, Canada, and
Japan and signed by its 46 member states. But only 25 countries ratified later. It aims at providing the
basis of an effective legal framework for fighting cybercrime, through harmonization of
cybercriminal offenses qualification, provision for laws empowering law enforcement and enabling
international cooperation [5].
General Data Protection Regulation (GDPR) is applicable as of May 25th, 2018, in all member
states to harmonize data privacy laws across Europe.[6] GDPR puts the individual as the central
element and obliges to protect their data through appropriate measures.
174
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
• Right of access - the individual has the right to access their own processed personal
information.
• The right to rectification - the person has the right to obtain the rectification of
incomplete and inaccurate information concerning him.
• The right to erasure - in some situations, the individual has the right to request the
deletion of data that is no longer needed.
• The right to restriction of processing - restriction of processing when there are grounds.
• The right to portability - the right of the person to request data portability from one
operator to another.
• The right to object - the right of the person to object to the processing, when there are
grounds.
• The right not to be subject to automated decision-making, including profiling - the
person has the right to human intervention in the case of important decisions concerning
him.
• The right to lodge a complaint with the Supervisory Authority - when she is dissatisfied
with the way in which her data is processed or when her rights have not been respected.
• The right to go to court - to obtain material and/or moral damages if damage has resulted
[6].
Just like any crime, cybercrimes produce certain legal effects and involve the responsibility of
the people. On the one hand, we have the criminal liability of the person or persons who stole or tried
to steal the data, and on the other hand, we have the responsibility on the companies towards the users
because they hat to do all the diligence to protect their information.
The legal ramifications of a data leak can be government fines, penalties, and in extreme
circumstance, jail time, are some of the consequences of not protecting personally identifiable
information adequately.
One ramification many don't consider is the cost of litigation associated with a breach. Many
of the associated lawsuits can end up as class-action lawsuits, potentially multiplying the total cost of
the breach exponentially [7].
Settlements can be harsh - depending on the judge or jury. For large breaches, settlements over
$100 million are not out of the question, especially when dealing with healthcare information.
Another cost of a breach includes having to pay the plaintiff's legal bills, which can be extremely high
[7].
A cyber-attack on your business that exposes personal or confidential data could have several
nasty consequences for your business, including:
• financial loss from stolen funds or a loss of income from an inability to operate your
business as usual.
• claims being made by customers, for example where you have not complied with your
privacy policy.
• claims for breach of contract if you do not meet your contractual obligations to comply
with data protection legislation.
• regulatory fines for non-compliance with GDPR or the Data Protection Act 2018.
• reputational damage as consumers lose faith in your ability to securely process their data
[8].
175
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
In order for us to have our data protected while we use our devices on the Internet we can use
some safety precautions so as for our personal information not to end up in the wrong hands. Some
advice that is widely used is for us to:
• Create strong passwords: For example, a strong password should contain at least 12
characters and contain a combination of lower and upper case letters, numbers and if
possible symbols.
• Never use the same password on multiple accounts: Having multiple passwords
makes it harder for hackers to gain access to your personal information.
• Don’t log in on personal account on free or public Wi-Fi: Open networks make it
really accessible for people to look into your activity and accounts.
• Install an antivirus and keep it updated: New viruses are created all the time and so
to have and extra layer of protection is always good to have an antivirus installed and
up-to-date.
• Don’t click on pop-ups and virus warnings: These warnings and now called
“scareware” which are fake security alerts that when you click them, they guide you to
install a program to remove the virus in your computer, but the link contains viruses.
• Be wary of phishing email: These emails are sent to thousands of people, pretending
to be from banks, companies, online shops, that try to send you on their website where
you are asked to write down your personal information.
• Store personal and financial information securely: Never access such information in
internet cafes or public computers [9].
7. Conclusion
Cybercrimes as we have seen in recent years have become more and more frequent and pose a
real threat to our personal and financial information. Attacks can vary in many different ways from
simple emails that try to insert malware in your personal devices if you click on them to full scale
attacks on websites owned by enterprises.
This paper wanted to show the problem of the damage that those attacks do is in most cases is
quite substantial not once for example did people lose their identity, credit cards information or even
social security numbers to data breaches by hackers. This is why we have to be extra careful with our
presence on the internet and take extra steps of precaution when navigating the web. The governments
took note of the risks that can occur while handling this type of information and so adopted the well-
known GDPR that protects our personal information on the Internet in a way that the data should be
processed legally and fairly to the data subject. Even explanations should be given to the person in a
language they can understand, without legal jargon.
Other steps that we can take to protect ourselves on the internet is to use different passwords
for the accounts we have, minimalize the information we share on social media, never click on links
or pop-ups that warn us that we have been infected with viruses and use an antivirus and keep it up
to date.
References
[1] Information Commissioner’s Office ‘Personal data breaches’. Available at: https://ico.
org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-
regulation-gdpr/personal-data-breaches/.
176
Proceedings of the International Conference on Cybersecurity and Cybercrime Vol. X / 2023
[2] Glossary ‘What Is a Data Leak? How They Happen and How To Prevent Them’ [Online]
Available: https://abnormalsecurity.com/glossary/data-leak.
[3] Wesley Chai and Linda Rosencrance, “What is a hacker“. May 2021 [Online]. Available:
https://www.techtarget.com/searchsecurity/definition/hacker.
[4] Ron Samson Jr. “Data Stealing; What Information is a Priority for Hackers?”. 2022
[Online]: https://www.clearnetwork.com/why-do-hackers-keep-stealing-the-same-consu
mer-data/.
[5] International cybercrime. 20 June 2022. Wikipedia. Available at: https://en.wikipedia.org
/wiki/International_cybercrime.
[6] Intersoft consulting: https://gdpr-info.eu/.
[7] The legal ramifications of a data breach: https://www.ironmountain.com/resources/gene
ral-articles/t/the-legal-ramifications-of-a-data- breach.
[8] Clive Mackintosh, “Legal consequences of a cyber-attack”: Date: 9 March 2022.
Available at: https://harperjames.co.uk/article/legal-consequences-of-a-cyber-attack/.
[9] ‘30 ways to love yourself online – A beginner‘s guide to Personal Data Privacy’.
Available at: https://www.privacy.gov.ph/30-ways/.
177