Page 34 - Banking Finance September 2025
P. 34
ARTICLE
A R T IC L E
to gather personal information about the deceased and
their family. Posing as charities, creditors, or legal represen-
tatives, these fraudsters exploit the emotional vulnerability
of their targets to solicit fake donations, steal inheritance
funds, or gain access to sensitive accounts. The psychologi-
cal toll on victims is immense, compounding their grief with
financial loss and a sense of betrayal.
As these examples illustrate, the dangers of data harvest-
ing extend far beyond privacy concerns. The misuse of per-
sonal information has enabled a surge in cyber frauds, high-
lighting the urgent need for stronger data protection mea-
sures and heightened public awareness.
Tools and Techniques of Data Harvesting
The methods employed by data harvesters are continually activity, ostensibly to enhance user experience and deliver
evolving. These tools and techniques demonstrate the so- targeted advertisements. However, these tracking tools also
phistication and scale of modern data harvesting efforts: collect vast amounts of browsing data, often without explicit
consent. This information can be aggregated to map user
Social Media Scraping behaviour and preferences, which, in the wrong hands, can
Social media platforms like Facebook, LinkedIn, and be weaponized for phishing or manipulation.
Instagram serve as goldmines for personal information.
Harvesters use automated bots and scraping tools to mine IoT Devices
publicly available details, such as birth dates, job titles, lo- The Internet of Things (IoT) introduces a new frontier for
cations, and even family connections. These data points, data harvesting. Smart devices, from fitness trackers to
seemingly harmless in isolation, can be combined to con- home assistants, continuously collect data about users' hab-
struct comprehensive profiles for targeted scams. its, health, and environment. While these devices promise
convenience, they often lack robust security measures,
Malicious Apps making them susceptible to unauthorized data extraction
Many apps, often masquerading as harmless utilities or en- and exploitation.
tertainment, come with inadequate privacy policies or em-
bedded malware. Once installed, these apps siphon exten- Web Scraping Tools
sive user data, including contact lists, location history, and Advanced web scraping tools, powered by machine learn-
device information. This data is frequently sold or exploited ing algorithms, automate the process of harvesting data
for unauthorized purposes, putting users at significant risk. from websites. These tools can bypass traditional security
measures, enabling harvesters to extract structured and un-
Data Breaches structured data efficiently. Businesses and cybercriminals
Large-scale breaches of company databases are a promi- alike employ these tools, highlighting the dual-edged nature
nent source of harvested data. Cybercriminals infiltrate of such technologies.
poorly secured systems to extract sensitive information,
exposing millions of records. The stolen datasets are then Public Records Exploitation
traded on the dark web, fuelling a thriving underground Governments and organizations maintain extensive public
economy. Such breaches highlight the critical need for ro- records that are often accessible online. Cybercriminals ex-
bust cybersecurity measures across organizations. ploit these repositories to gather personal details, such as
property records, voter registrations, or legal filings. While
Browser Tracking these records are intended for transparency, they inadvert-
Websites employ cookies and tracking pixels to monitor user ently provide a treasure trove for data harvesters.
BANKING FINANCE | SEPTEMBER | 2025 | 31