Ask the Community
Groups
Identified method used to capture/ steal data: how was the data stolen or compromised? - Connect IT Community | Kaseya
<main> <article class="userContent"> <ul><li> <strong>Tested:</strong> the compromised data was tested to determine if it is live/active;</li> <li> <strong>Sample:</strong> the compromised data was posted to prove its validity;</li> <li> <strong>Keylogged or Phished:</strong> the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;</li> <li> <strong>3rd Party Breach:</strong> the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;</li> <li> <strong>Accidental Exposure:</strong> the compromised data was accidentally shared on a Web, social media, or Peer-to Peer site;</li> <li> <strong>Malicious / Doxed:</strong> the compromised data was intentionally broadcast to expose PII. </li> </ul> </article> </main>