1 min read

Second-Hand USBs Purchased on eBay Expose Personal and Financial Information of Users

Alina BÎZGĂ

November 03, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Second-Hand USBs Purchased on eBay Expose Personal and Financial Information of Users

More than two-thirds of second-hand USBs purchased from auction platforms such as eBay contain private and sensitive information belonging to their previous owners, according to researchers at Abertay University.

An analysis of 100 USB drives purchased from the e-commerce website revealed 75,000 files with personal and financial information, cataloged in three categories:

• Low sensitivity such as evidence of downloaded videos, Operating System Boot/Installation Drives (Microsoft Windows), student work, and promotional and press release materials
• Medium sensitivity such as image files with GPS location, personal photographs and studies containing clinical trials
• High sensitivity such as files with passwords, CVs, personal statements, employment contracts, time sheets, invoice records, divorce information, bank statements, health records and web pages

A closer examination found that resellers properly wiped only 32 of the 100 USB devices. Using publicly available recovery tools, researchers partially recovered files from 26 of the portable storage devices and fully recovered the entire sets of files stored on the remaining 42 USBs.

“This is extremely concerning, and the potential for this information to be misused with extremely serious consequences is enormous,” cybersecurity division professor Karen Renaud said. “An unscrupulous buyer could feasibly use recovered files to access sellers” accounts if the passwords are still valid, or even try the passwords on the person”s other accounts given that password re-use is so widespread.”

Researchers also surveyed eBay sellers, revealing that 64% of respondents had found a used USB lying around, while 81% said they had never misplaced a USB drive.

Were you a victim of a data breach? Time to find out with Bitdefender”s Digital Identity Protection tool.

When asked what they would do if they found a used USB, 94% of respondents said they would plug it in, 10% would format it, 38% would use forensics tools to check it out, and 44% would scan it with antivirus tools.
Investigators recommend using a security solution when plugging in a previously owned USB and securely wiping drives before selling them to prevent access to any personal data.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read