Identified method used to capture/ steal data: how was the data stolen or compromised?

  • Tested: the compromised data was tested to determine if it is live/active;
  • Sample: the compromised data was posted to prove its validity;
  • Keylogged or Phished: the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;
  • 3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;
  • Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to Peer site;
  • Malicious / Doxed: the compromised data was intentionally broadcast to expose PII. 

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section