Skip to content

AI-driven fraudsters are recycling old stolen information, a caution issued by data security specialists.

Criminal scoundrels are revitalizing old stolen data using Artificial Intelligence, according to Consumer Investigator Caresse Jackman. These deviants are repacking previous breaches, and Jackman offers insights into this practice and suggests ways to remain secure.

AI-powered con artists reusing old data theft to deceive, experts caution
AI-powered con artists reusing old data theft to deceive, experts caution

AI-driven fraudsters are recycling old stolen information, a caution issued by data security specialists.

=====================================================================================

In the digital age, the security of personal and corporate data has never been more crucial. A recent trend, first noticed by the Identity Theft Resource Center (ITRC) in May and June of 2022, has highlighted the growing threat of previously disclosed or compromised data (PCD).

This trend has seen scammers utilizing artificial intelligence to repackage data they stole years ago, a significant concern for ITRC's President, James Lee. According to Lee, PCD poses a significant threat to companies, particularly those with insecure cloud environments.

The discovery of an unsecured cloud database containing 16 billion previously stolen logins and passwords further underscores this threat. This vast trove of data, potentially available for criminals to use in ransomware attacks, fraud, and scams, has affected hundreds of millions of people and companies, including users of Google, Facebook, Instagram, Apple, PayPal, Amazon, Microsoft, and Spotify accounts.

Lee emphasizes the importance of not reusing passwords due to the ongoing threat of PCD. He advises changing passwords regularly and suggests using the strongest security settings possible to keep hackers out. In addition, turning on multi-factor authentication is recommended to enhance account security.

To offer greater security, Lee recommends the use of passkeys, which replace passwords and do not require users to remember anything to log in. Unlike traditional passwords, passkeys are considered far more secure.

In light of these threats, Lee also recommends preparing for potential data breaches, even if one has not occurred yet, to ensure security. By following these recommendations, individuals can protect themselves from the ongoing threat of previously compromised data.

This article is copyrighted by Gray Media Group, Inc. in 2025. It serves as a reminder of the importance of digital security in the face of ever-evolving threats. By staying vigilant and implementing strong security measures, we can help protect our personal and corporate data from falling into the wrong hands.