Page 34 - Banking Finance September 2025
P. 34

ARTICLE
                                                                                          A R T IC L E
         to gather personal information about the deceased and
         their family. Posing as charities, creditors, or legal represen-
         tatives, these fraudsters exploit the emotional vulnerability
         of their targets to solicit fake donations, steal inheritance
         funds, or gain access to sensitive accounts. The psychologi-
         cal toll on victims is immense, compounding their grief with
         financial loss and a sense of betrayal.

         As these examples illustrate, the dangers of data harvest-
         ing extend far beyond privacy concerns. The misuse of per-
         sonal information has enabled a surge in cyber frauds, high-
         lighting the urgent need for stronger data protection mea-
         sures and heightened public awareness.

         Tools and Techniques of Data Harvesting
         The methods employed by data harvesters are continually  activity, ostensibly to enhance user experience and deliver
         evolving. These tools and techniques demonstrate the so-  targeted advertisements. However, these tracking tools also
         phistication and scale of modern data harvesting efforts:  collect vast amounts of browsing data, often without explicit
                                                              consent. This information can be aggregated to map user
         Social Media Scraping                                behaviour and preferences, which, in the wrong hands, can
         Social  media  platforms  like  Facebook,  LinkedIn,  and  be weaponized for phishing or manipulation.
         Instagram serve as goldmines for personal information.
         Harvesters use automated bots and scraping tools to mine IoT Devices
         publicly available details, such as birth dates, job titles, lo-  The Internet of Things (IoT) introduces a new frontier for
         cations, and even family connections. These data points,  data harvesting. Smart devices, from fitness trackers to
         seemingly harmless in isolation, can be combined to con-  home assistants, continuously collect data about users' hab-
         struct comprehensive profiles for targeted scams.    its, health, and environment. While these devices promise
                                                              convenience, they often lack robust security measures,
         Malicious Apps                                       making them susceptible to unauthorized data extraction
         Many apps, often masquerading as harmless utilities or en-  and exploitation.
         tertainment, come with inadequate privacy policies or em-
         bedded malware. Once installed, these apps siphon exten- Web Scraping Tools
         sive user data, including contact lists, location history, and  Advanced web scraping tools, powered by machine learn-
         device information. This data is frequently sold or exploited  ing algorithms, automate the process of harvesting data
         for unauthorized purposes, putting users at significant risk.  from websites. These tools can bypass traditional security
                                                              measures, enabling harvesters to extract structured and un-
         Data Breaches                                        structured data efficiently. Businesses and cybercriminals
         Large-scale breaches of company databases are a promi-  alike employ these tools, highlighting the dual-edged nature
         nent source of harvested data. Cybercriminals infiltrate  of such technologies.
         poorly secured systems to extract sensitive information,
         exposing millions of records. The stolen datasets are then Public Records Exploitation
         traded on the dark web, fuelling a thriving underground  Governments and organizations maintain extensive public
         economy. Such breaches highlight the critical need for ro-  records that are often accessible online. Cybercriminals ex-
         bust cybersecurity measures across organizations.    ploit these repositories to gather personal details, such as
                                                              property records, voter registrations, or legal filings. While
         Browser Tracking                                     these records are intended for transparency, they inadvert-
         Websites employ cookies and tracking pixels to monitor user  ently provide a treasure trove for data harvesters.


            BANKING FINANCE |                                                           SEPTEMBER | 2025 | 31
   29   30   31   32   33   34   35   36   37   38   39