{"id":34441,"date":"2020-04-16T12:00:05","date_gmt":"2020-04-16T12:00:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/"},"modified":"2020-04-16T12:00:05","modified_gmt":"2020-04-16T12:00:05","slug":"bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/","title":{"rendered":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property"},"content":{"rendered":"<p>With more people looking to get into the online crime racket and huge caches of personal information cheap and easy to come by, documents describing the process of committing (and getting away with) online fraud are becoming hot commodities.<\/p>\n<p>This according to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.dropbox.com\/s\/k6vvgotghvz81ql\/Data%20Commodity%20Report.pdf?dl=0\">a study<\/a> [PDF] from security biz Terbium Labs, which analyzed three massive darknet markets, and found that fraud guides were by far the most popular item being sold. The study was based on observations of Empire Market, White House Market, and Canadian HeadQuarters, three underground souks the researchers likened to Amazon and eBay in their massive footprints and use of ratings to rank merchants.<\/p>\n<p>The Terbium team reckons that these guides, which help newbie crooks through the process of things like setting up bank fronts, crafting phishing emails and stealing money out of victim accounts, make up just under half (49 per cent) of all data transactions on the store (not including drugs or for-hire services like DDoS attacks).<\/p>\n<p>&#8220;What they have in common is detailed information on how to export an organization&#8217;s current policies,&#8221; Terbium Labs said of the guides. &#8220;Oftentimes, the content in fraud guides doesn&#8217;t require any prior knowledge from the reader (criminal) and can realistically lead to successful execution of the outlined steps.&#8221;<\/p>\n<p>By comparison, financial data records were a distant second, only accounting for 15.6 per cent of all transactions, followed by non-financial account details, which made up 12.2 per cent of what people were buying.<\/p>\n<p>The merchants are not only selling more of the guides, they are also getting a better price for them than stolen financial records generally fetch. A single fraud guide will typically run you about $7.80, while account details will vary widely in prices and low-value credentials could only for for about $1 each.<\/p>\n<p>&#8220;We routinely see stolen data for sale on these markets for surprisingly low prices, considering how expensive the consequences of stolen data can be to an organization,&#8221; said Terbium chief strategy officer Tyler Carbone. &#8220;The missing piece here is the way criminals buy that data and make use of available knowledge and tools to exploit it.&#8221;<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/10\/27\/reaperpeace.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"chrome\"><\/p>\n<h2 title=\"Ongoing Chrome Web Store security saga deftly straddles tragedy and farce\">Another day, another Google cull: Chocolate Factory axes 49 malicious Chrome extensions from web store<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/04\/15\/google_malicious_chrome\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>This despite what Terbium says is a skeptical attitude toward the guides and their accuracy of information. Despite not expecting many of the schemes in the guides to actually work (criminals can&#8217;t be trusted &#8211; go figure), would-be hackers are so desperate for material that they buy up the how-to manuals in droves.<\/p>\n<p>Interestingly, what Terbium advises its customers to do is learn about what is in these guides and guides and take countermeasures.<\/p>\n<p>In addition to protecting companies from the specific schemes mentioned, this will also play against the greatest weakness of these markets: the common belief among criminals that guides are often unreliable and inaccurate.<\/p>\n<p>&#8220;This is a good thing for businesses \u2013 if a business purchases a fraud guide early, they can change the affected internal policies immediately and thereby, render that fraud guide useless,&#8221; Terbium explains.<\/p>\n<p>&#8220;As a result, the seller of that fraud guide will be discredited and likely deemed untrustworthy by other criminals.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1925\/-8451\/build-the-next-generation-of-your-business-in-the-public-cloud?td=wptl1925\">Webcast: Build the next generation of your business in the public cloud<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/04\/16\/cybercrimeby_fraud_lessons\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-crims bone up on methods for fun and profit, but mainly profit With more people looking to get into the online crime racket and huge caches of personal information cheap and easy to come by, documents describing the process of committing (and getting away with) online fraud are becoming hot commodities.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34442,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34441","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T12:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property\",\"datePublished\":\"2020-04-16T12:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\",\"name\":\"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg\",\"datePublished\":\"2020-04-16T12:00:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/","og_locale":"en_US","og_type":"article","og_title":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-16T12:00:05+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property","datePublished":"2020-04-16T12:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/"},"wordCount":564,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/","url":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/","name":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg","datePublished":"2020-04-16T12:00:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bad-news-so-much-of-your-personal-data-has-been-hacked-that-lesson-manuals-on-how-to-use-it-are-the-latest-hot-property\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34441"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34441\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34442"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}