1 hour 31 minutes
So now that a hacker has a victim's name, address and date of birth,
what else can they do with this?
A hacker might start off by going onto an International Student Association site. I've just chosen one here at random and apply for a student I D card.
They go through some very basic tricks before they issue out a student i. D. So the hacker can also apply for a physical idea by providing the victim's name, address and date of birth,
and the hacker provides their own photograph. They can easily get a credit card sized photographic i d with the victim's details about the hackers photograph on it.
From there, they can go online and asked for a replacement driver's license.
You need a supply, some information. So here I've just gone on to the U. K's White Pages website to find a person's name and address to apply for replacement license. We don't need to know. Its number
we need to do is put in the victim's address,
and as long as that person has been living there for a minimum of three is, you simply click next
from there, you entering some basic information now, this information might be a little more difficult to obtain, but it shouldn't be that difficult.
So the key things that are required, our marital status,
the birth surname,
the mother's maiden name and place of birth.
You can utilize social media to find this information.
Once you've done that, you can click next
because he can skip the national insurance number.
You can also skip the UK passport number,
and then you can skip the first. I'm not available
from here. We'll ask you to explain why you need new license, and simply all you do is take lost license. You don't need to necessarily put that the police have been informed because I will ask you for a place incident number.
Once you've done that, you just check through the details, submit your credit card details and click. Come firm.
Easy is that
from there? What the hacker will do is they will go to the Royal Mail website and request for a male redirection service. It will ask for some basic information, including things like a driver's license
or a statement with the person's State House on it.
So if it's a statement, it's very easy for the hacker to force that information. So once the hacker is applied for this information, thou ask for the mouth to be redirected to it. Dead side,
a dead Sinus, a house that doesn't lived it.
The hacker will do this because they want to make it as easy as possible for them to gain access to the mail.
What the hacker will do is they'll be on the lookout for critical information. This could be a credit card statement, a bank account statement, a utility bill or anything else that has the information off that person that is addressed to that person as a proof point of identification.
Well, they'll also be waiting for is the replacement driver's license.
Once they've got that, they can then move to the next stage,
which is to open up a bank account.
If the heck and knows which bank the victim is with. They won't set up a new bank account with same bank. What they'll do is they'll look for a smaller bank or a credit union and open up a new bank account with that bank with the victim's details.
I have seen where a hacker will do this with up to eight different bank accounts
from there. What they'll do is they will start investing £50.2 week into these bank accounts.
What this does is it creates a savings history, and then at the end of six months, what the hacker will do is they'll apply for a small personal life.
They pretend that they're going overseas, and they want to use the money for the overseas holiday.
The bank will do a very basic check because the amount of money is very small, and so what they'll do is, though, ensures that, yes, date know who the person is because they have a bank account with them.
They have a regular savings history with the bank,
and they'll do a simple credit check to ensure that there aren't any outstanding debts, et cetera.
Generally speaking, the bank was then approved the loan within 24 hours.
Now, if the hacker has done this with those eight different banks, it is very easy for them to then withdraw eight lots of £5000.
And it was far easier and quicker for the hacker to steal that person's identity and use that for fraud or theft. then it will be for the person to prove that their identity had been stolen in the first place.
So let's go through the assessment question. What information do you need to do? Identity theft,
address, date of birth or place of work?
But the correct answer is
your name, your address, any date of birth, that's all. Unite.
So in today's lecture, we discussed how a hacker can use your information to not only do identity theft, but to also cause real harm. In this particular case, remote wife accounts and devices,
the hacker or the thief can also gain enough documentation to open up a bank account and take out personal loans, et cetera, all in that person's name.
I hope you found this section really useful and interesting, because for May I love talking about this because I want to be able to educate everybody on how to stay safe online
In this online course, you will learn how to craft the perfect phishing email to ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Certified Information Systems Security Professional (CISSP)
CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to ...
19 CEU/CPE Hours Available
Certificate of Completion Offered