Scams and people search sites: a dangerous intersection

Scammers use people search sites to identify and target you.

Scams and people search sites: a dangerous intersection
Scams and people search sites: a dangerous intersection

Cybercriminals use personal information to carry out scams, fraud, and identity theft. Surprisingly, much of the information they need is easily accessible on people search sites, as these companies collect and sell your personal data, including family information, without your knowledge.

This data can become even more vulnerable to breaches if it is stored on these sites. For example, I recently discussed an alarming incident where 2.7 billion records were stolen from a background search site called National Public Data and then shared for free on a cybercrime forum.

Your risk of falling victim to scams increases significantly if your personal information is available on people search sites and data broker databases. However, don't worry, I'll provide you with a detailed explanation of how this happens and what you can do to protect yourself and stop it.

iphone and keyboard
Illustration of a cybercriminal at work  (Kurt "CyberGuy" Knutsson)

Cybercriminals exploit people search sites for personal data

These websites, such as Whitepages, Spokeo, and BeenVerified, are intended to assist users in locating and connecting with others. However, they have become valuable resources for cybercriminals. Although there are warnings against using the data for stalking, harassment, or harm, these sites provide a wealth of information that can be exploited by malicious actors.

Personal details, including addresses, phone numbers, email addresses, birthdates, family information, employment history, religious beliefs, political affiliations, property records, court and police records, and hobbies and interests, can be accessed by scammers.

The extensive data provided by these websites enables cybercriminals to construct detailed profiles of potential victims, increasing the likelihood of successful scams or identity theft. The vast amount of personal information accessible through these platforms poses a significant threat to individuals' privacy and security.

woman on laptop
A woman is upset about her personal information being online. (Kurt "CyberGuy" Knutsson)

3 ways scammers use people search sites

Scammers are exploiting people search sites to target their next victims. This is a concerning issue, but being aware of it can help us stay vigilant.

1. Finding victims

Cybercriminals can easily access people search sites to gather information about random individuals. They can search for names and obtain a wealth of details, including email addresses, phone numbers, and other contact information. This is where things become risky.

2. Profiling victims

Scammers can use information from data brokers and people search sites to create detailed profiles of their targets, including job history, family status, and even their susceptibility to tech jargon due to age. Studies show that 60% of cybercrimes against seniors, who are particularly vulnerable, are partly driven by the personal information available online.

3. Putting the plan into action

Scammers can use all the information they have gathered to launch targeted phishing attacks, steal money, or commit identity theft. Numerous stories exist of individuals falling victim to these scams and losing their identities.

Scammers often obtain their information from people search sites. In some cases, data brokers such as Epsilon, Macromark, and KBM have been found to sell personal information directly to scammers, enabling them to target and exploit vulnerable individuals.

a laptop
A person using a people search site on their laptop. (Kurt "CyberGuy" Knutsson)

1. Use privacy settings on social media platforms to limit visibility of personal information. 2. Use a virtual private network (VPN) to mask your IP address and location. 3. Use a search engine that does not store or track personal information. 4. Use a privacy-focused search engine that allows you to control what information is displayed.

It's wise to keep your information off threat data aggregators like people search sites to make it harder for scammers to target you. While it won't completely stop them, it will limit the number of places your data can be found online and reduce the chances of it being involved in a data breach. However, removing your information from people's search sites can be challenging. Nonetheless, it's achievable. Here's how to do it.

Find and remove your data from people search websites that sell it.

The initial step is to locate websites that sell your personal information and request them to remove it. However, be aware that this may require a significant investment of time and continuous upkeep.

To remove your personal information from various search engine results, you'll need to look up your name, phone number, email address, or home address on a popular search engine. You'll then encounter multiple people search sites in the search results. After reviewing the results pages, visit each website and submit individual opt-out requests.

To keep your data offline, you'll need to check back every few months and remove it again since most people search sites will add your personal information back to their databases when they refresh their databases.

If you have some extra money, I suggest using a personal information removal service. These services remove your data from various people search websites and data brokers. Here are my top picks for data removal services.

2. Limit the number of online tools and services you use

Be cautious when using online tools and services, as many of them collect and sell your personal information to third parties, such as people search sites and data brokers.

Research by Incogni found that 44% of Chrome extensions collect your personally identifiable information (PII), even if they don't sell it, increasing the risk of data breaches and malicious activity if the extension goes rogue.

Evaluate the apps, extensions, and online accounts you use, remove anything you don't need, review the privacy policies of the ones you keep, and consider using privacy-conscious alternatives.

3. Use throwaway emails and burner numbers wherever possible

In today's digital era, it is challenging to function without online tools. To access many of them, you must provide personal information such as an email or phone number. However, this information is often shared with third parties and ends up on people search sites and data brokers, ultimately leading to an increase in spam and malicious attacks.

Using burner numbers and masked accounts is safer online. It enables you to sign up, communicate, and control your online accounts while keeping your personal data and activities separate from your real identity.

4. Use private browsers and search engines

Online tracking and data sharing are common features of many browsers and search engines. However, there are privacy-focused alternatives available.

I have previously suggested some privacy-focused search engine alternatives, each with its own advantages and disadvantages, but all of them maintain your search history confidentiality. Similarly, your browser privacy is also ensured.

Kurt's key takeaways

While searching websites can be helpful for reconnecting with friends or obtaining information, they also pose significant risks to our privacy and security. To safeguard our personal data, we must take proactive measures to make it more difficult for cybercriminals to misuse our information.

What is your opinion on the responsibility of companies that collect and sell personal data regarding user privacy? Please share your thoughts at Cyberguy.com/Contact.

To receive my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter at Cyberguy.com/Newsletter.

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

by Kurt Knutsson, CyberGuy Report

tech

A revolutionary device may enable you to identify microplastics in your beverages.

A revolutionary device may enable you to identify microplastics in your beverages.

tech
Become a proficient user of Google Workspace and Microsoft Office.

Become a proficient user of Google Workspace and Microsoft Office.

tech
Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

Nearly 300,000 customers' information was exposed in the Avis Rent A Car cyberattack.

tech
Human window washers on skyscrapers are being replaced by robots.

Human window washers on skyscrapers are being replaced by robots.

tech
A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

A poll has shown that most Americans do not trust information about elections that is generated by artificial intelligence.

tech
How to safeguard your baby monitor from hackers?

How to safeguard your baby monitor from hackers?

tech
The origin of the bizarre "hello" text messages.

The origin of the bizarre "hello" text messages.

tech
Over 900,000 Medicare beneficiaries are at risk of data breach.

Over 900,000 Medicare beneficiaries are at risk of data breach.

tech
Humans can teach robots to sense human touch without the need for artificial skin.

Humans can teach robots to sense human touch without the need for artificial skin.

tech
Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

Apple's daring advancement in AI technology: The release of the iPhone 16, AirPods, and watches.

tech
Conduct a 5-minute phone privacy audit to prevent spying.

Conduct a 5-minute phone privacy audit to prevent spying.

tech
Scams and people search sites: a dangerous intersection

Scams and people search sites: a dangerous intersection

tech
Reach your destination effortlessly with this advanced self-driving sleep pod.

Reach your destination effortlessly with this advanced self-driving sleep pod.

tech
US political campaigns face increased digital attacks from Iranian hackers.

US political campaigns face increased digital attacks from Iranian hackers.

tech
A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

A Chinese robo-helper can perform a variety of tasks, including cleaning, cooking, and even shooting hoops.

tech
Four effective strategies for reducing expenses.

Four effective strategies for reducing expenses.

tech