The notoriety that comes with taking credit for a data breach is alluring. Declaring a successful data breach can suddenly bring a lot of attention, which is why posting bogus data is attractive.For companies and organizations, it’s a real headache, since an allegation of a breach can immediately pose public relations challenges.“The speed of the news cycle is a lot faster than the speed of the incident response process,” said Allison Nixon, a threat researcher with consultancy Deloitte.Nixon wrote a paper describing some non-intrusive techniques for figuring out if a data breach is legitimate. The paper, she said in a phone interview on Wednesday, is intended to allow third parties to get a sense whether a leak is real. Bogus data releases, or ones that recycle data from old breaches, are common. Since data breaches draw attention, it’s easy for fame-seekers to insert a political message along with the data on sites such as Pastebin, a site for anonymously posting content.“I would say that the motivations are really based on power, ego and fame,” Nixon said. “The people that are releasing these leaks — most of them are doing so under a handle, and they’re trying to build a reputation. “If you’re unable to produce a real data breach, then I guess this is the next best thing,” she said.One of the verification techniques is figuring out if a particular email address really was used to register an account with a Web service. Some sites won’t allow two accounts to be registered with the same email address.“If the company does enforce e-mail uniqueness, the veracity of the leak can be tested by changing an account’s e-mail to randomly selected e-mails in the leak,” according to the paper. “Almost all e-mails should be traceable to the company’s site; untraceable emails indicate that the leak is very likely fake.”Other Web services will also “leak” a bit of information, such as whether a username exists or not, which can also indicate if the published data is a true leak.Nixon cautioned that it is not recommended to try the purportedly leaked username and password combinations to log in to a Web service. That could have legal ramifications.“The techniques compiled in this paper were done so with the idea of causing minimal impact and causing minimal legal problems,” Nixon said. In other cases, just looking at username and password combinations and the service that the details purportedly came from can send up a red flag.For example, websites that have restrictions on what types of passwords are acceptable can help to debunk a breach. If the results from a supposed breach contain simple passwords such as “123456” on a website that requires stronger passwords, “the leak should be treated with suspicion,” the paper said.Nixon said she came up with an idea for another test that might indicate a breach is real.One leak she analyzed consisted of credit card data. She thought the data was fake because it was potentially valuable in the underground. It didn’t make sense for someone to freely publish the data if it had value. To test it, Nixon compared first names of people in the breach with a list of the most common names based on their birth year. The distribution of names indicated the breach might be legitimate.“It would be interesting to see further research in that area,” Nixon said.However, further investigation showed the credit card data was old, as the expiration dates of the cards had mostly passed, Nixon said. The data had merely been recycled and didn’t really come from its purported source.“There was no new breach,” she said.Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe