Privacy legislation has expanded significantly in the last two years with the publication and enforcement of the EU’s General Data Privacy Regulation (GDPR). In Jan. 2020, the California Consumer Privacy Act (CCPA) will go into effect, with similar requirements to GDPR, in CA. Other states including Texas, New York, Washington, and Massachusetts are following suite. EU and CA privacy legislation attempts to protect our private data by granting certain rights. These rights allow one to manage the data businesses keep on us through “Data Privacy Requests”. These requests can include but are not limited to the right to have businesses:
Unfortunately, businesses have not prepared properly for these requests. World wide, businesses are scrambling to accommodate GDPR data privacy requests being made by EU residents. US businesses with private data on Californians are hurrying to build processes to accommodate data privacy requests from CA residents beginning January 1st, 2020.
Wouldn’t it be ironic if the next wave of privacy breaches stemmed from data privacy requests made by hackers under these legislative acts? This is the very problem CyberHoot sees with these acts. Businesses have not yet built robust, multi-factor “Data privacy request” processes that verify the identity of each requester!
Surprise, surprise, a British researcher name James Pavur, reported in this Black Hat briefing in Aug. 2019, that after making 150 “data privacy requests” for his wife’s private data, businesses sent him her:
Importantly, Pavur did not forge any documents, signatures or email addresses. He used his own credentials, signature, and email account in every case to request these items. Businesses simply did not verify his identity. Now, imaging what a hacker who forges signatures, documents, and breaks into your email account could do? CyberHoot has some predictions for you.
CyberHoot is not suggesting Google and Facebook will be easily fooled into giving your private data away. However, other companies who have your data are not yet prepared to handle these requests. CyberHoot challenges businesses to build secure verification processes before hackers exploit you in this novel and horribly ironic way.
Author, Craig, Co-Founder – CyberHoot
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.