III-OSINT-Module 16: Data Breaches

Introduces Data Breaches, then explains and provides live on-line demonstrations of the processes to locate and capture intelligence.

TRAINING OBJECTIVES

The practitioner will be introduced to the extensive velocity & variety of data breaches and will learn how to extract intelligence from them for the benefit of an investigation.

LEARNING OUTCOMES

The practitioner will be introduced to Data Breaches and will know how to locate and extract intelligence from different types of Data Breach.

PUBLIC AUTHORITY / PRIVATE SECTOR DIFFERENTIATION

Module 16 does differentiate but only in the Live Online Training, where investigation opportunities that are available only to Law Enforcement officers are introduced.

TABLE OF CONTENTS

INTRODUCING DATA BREACHES

DEFINITION

DIFFERENTIATING A DATA LEAK

VELOCITY & VARIETY

 

CAUSES & VULNERABILITIES

WEAK & STOLEN CREDENTIALS

BACK DOORS, APPLICATION VULNERABILITIES

MALWARE & RANSOMWARE

SOCIAL ENGINEERING

EXCESSIVE PERMISSIONS

INSIDER THREATS

PHYSICAL ATTACKS

IMPROPER CONFIGURATION, USER ERROR

 

PROMINENT DATA BREACHES

CAM4

YAHOO 2017

VERIFICATIONS.IO

LINKEDIN 2021

FACEBOOK 2019

YAHOO 2014

STARWOOD (MARRIOTT)

ADULT FRIEND FINDER

TWITTER 2018

LINKEDIN 2012

EQUIFAX

EBAY

 

DATA EXTORTION

DATA BACKUP

ALTERNATIVE EXTORTION

 

PROCESSING DATA BREACHES

LEGAL IMPLICATIONS

 

DATA BREACH RESOURCES

FREE RESOURCES

HAVE I BEEN PWNED

BREACH CHECKER

SCATTEREDSECRETS

FREEMIUM RESOURCES

INTELLIGENCEX

LEAK-LOOKUP

PREMIUM RESOURCES

PASTE BIN RESOURCES

PASTE BINS & BREACH DATA

TEXTBIN 28

PASTEBIN SEARCH 29

PSBDMP 30

PASTE BIN SEARCH ENGINE

DARK WEB RESOURCES

RANSOMWARE GROUP SITES

 

BL@C0KTR

LOCK DATA AUCTION

SNATCH

Module 16
CPD Credits: 5 Hours
Duration:

Preparation (PDF): 02:00

Live Online Training: 02:30

Module Assessment: 00:30

CPD Certificate:

LOT Courses LOTs for LEAs 18 Blended OSINT Modules 18 Blended III Modules