What Happens in a Data Breach? From Hack to Dark Web

The complete lifecycle of a data breach — how attackers infiltrate systems, exfiltrate data, monetise it on the dark web, and why victims are often the last to find out.

Data breach lifecycle from hack to dark web
1How Breaches Happen

How Attackers Get In: Common Breach Entry Points

Data breaches begin with an attacker gaining unauthorised access to a system. The entry points vary: exploiting unpatched software vulnerabilities in web servers or database systems; credential stuffing (using previously leaked username/password combinations to log in to systems where employees reused passwords); phishing attacks targeting employees to steal credentials or deploy malware; social engineering of IT support staff to gain access; supply chain attacks (compromising a software vendor whose product is trusted by the target organisation); and in some cases, insider threats from current or former employees.

Once inside a network, sophisticated attackers often remain undetected for extended periods — moving laterally through the network, escalating privileges, mapping the environment, and identifying high-value data stores. The 2023 IBM Cost of a Data Breach Report found the average time to identify a breach was 204 days, and the average time to contain it was an additional 73 days. This means the average breach victim organisation is compromised for nearly 10 months before detecting the intrusion — during which the attacker has full access to everything in scope.

For Hong Kong organisations, the most common breach entry points documented by the HKPF and PCPD include: phishing emails targeting finance and IT staff; exploitation of unpatched vulnerabilities in internet-facing systems (web applications, VPN gateways, email servers); compromised third-party vendors with access to HK systems; and misconfigured cloud storage (publicly accessible S3 buckets or Azure Blob Storage containing customer data). The HKMA also reports that targeted attacks against financial institutions frequently begin with spear phishing of employees with privileged access.

  • Phishing is the leading entry point: The majority of significant data breaches begin with a phishing email that successfully compromises employee credentials or deploys malware.
  • Unpatched vulnerabilities: Exploiting known, unpatched vulnerabilities in internet-facing systems is responsible for a significant proportion of breaches — patch management is critical.
  • Credential stuffing: Using breach data from other incidents to test credentials against the target organisation — enabled by employee password reuse.
  • Supply chain attacks: Compromising a trusted vendor or software provider to gain access to customer organisations — increasingly common since the SolarWinds incident.
  • Cloud misconfiguration: Misconfigured cloud storage with publicly accessible data is a significant and entirely preventable breach category.
  • Extended dwell time: Average 204 days before detection — attackers typically have comprehensive access to an organisation's data long before the breach is discovered.
Full data breach lifecycle explained →
Data breach entry points and causes
2Exfiltration and Monetisation

How Stolen Data Is Exfiltrated and Monetised on the Dark Web

Once an attacker has identified and accessed valuable data, the exfiltration phase begins. Large databases are typically compressed, encrypted, and transferred out of the compromised network in ways designed to avoid triggering data loss prevention (DLP) systems — using legitimate file transfer protocols, cloud storage services, or encrypted channels that blend with normal traffic. Exfiltration may happen in a single bulk transfer or in small increments over time to avoid anomaly detection.

After exfiltration, the monetisation strategy depends on the data type and the attacker's profile. Nation-state actors typically use the data directly for intelligence purposes — building profiles on individuals, extracting trade secrets, or establishing access for future operations. Criminal groups have several monetisation paths: selling the entire database in bulk on dark web markets (typically to the highest bidder in a private transaction or public auction); selling in smaller lots by data type (just the credit card numbers, or just the login credentials); using the data directly for fraud; or using it as the basis for targeted phishing campaigns against the affected individuals.

The dark web price structure for stolen data is fairly established. Freshly stolen credit card data (with CVV, billing address, and card number) typically sells for $5-20 USD per card, with premium pricing for cards from high-balance or premium accounts. Email/password combinations from consumer services sell for $1-5 USD per 1,000 records in bulk. Full identity packages ("fullz" in criminal terminology — including name, date of birth, HKID, address, and bank account details) command $10-50 USD each. Medical records are the most valuable, selling for $250-1,000 USD each due to their utility for medical identity fraud.

  • Bulk database sales: Large breach databases are auctioned or sold privately to the highest bidder, then resold in smaller lots to criminal buyers.
  • Credit card data pricing: HK$40-160 per card for fresh stolen credit card data with CVV — price reflects usability and balance.
  • Credential combo lists: Email/password combinations packaged for credential stuffing attacks against banking and financial services.
  • "Fullz" — complete identity packages: Name, HKID, DOB, address, financial data compiled into packages for comprehensive identity fraud.
  • Medical record premium: Medical records sell for 10-50x the price of credit card data due to their utility for medical identity fraud and health insurance fraud.
  • Nation-state use: Government and corporate espionage breaches may never appear on dark web markets — the data is used directly rather than sold commercially.
Detailed breakdown of how stolen data is used →
Data exfiltration and dark web monetisation
3Discovery and Notification

How Breaches Are Discovered — and Why You're Often the Last to Know

The discovery of a data breach can come from multiple sources, and the victim organisation is often not the first to identify it. Security researchers scanning the dark web may find the data on sale before the breached company knows it's gone. Cybersecurity journalists investigating criminal forums may surface the breach. Have I Been Pwned's Troy Hunt receives frequent breach data submissions from sources that include security researchers, law enforcement, and occasionally the criminals themselves. Victims themselves reporting fraudulent activity can trigger an investigation that reveals a breach.

When a breached organisation discovers an incident, it typically engages forensic investigators and legal counsel before making any public disclosure. This internal investigation phase — determining the scope, timing, and nature of the breach, and whether regulatory disclosure obligations apply — can take weeks or months. In Hong Kong, the PDPO does not mandate breach notification in all cases, meaning organisations may choose not to publicly disclose a breach unless required by their industry regulator (e.g., HKMA for financial institutions) or until a formal data leakage complaint is filed with the PCPD.

Breach notifications, when they do arrive, are often vague about the nature and extent of the exposure. Legal liability concerns lead organisations to phrase notifications carefully, sometimes making it difficult for individuals to assess the actual risk. Critical information to extract from any breach notification: which data types were exposed (password hash vs plain text; whether HKID or financial data was included); when the breach occurred (not when it was discovered); what the company is doing to remediate; and what specific actions they recommend affected users take.

  • You're rarely first to know: Dark web monitoring services, security researchers, or HIBP often have breach data weeks or months before the affected organisation notifies users.
  • HK notification is voluntary for many breaches: Without mandatory notification laws for all breach types, many HK breaches are never formally reported to affected individuals.
  • Average 204-day discovery gap: The attacker typically has 204 days of access before the breach is detected — your data may have been on the dark web for months before any notification.
  • Vague notifications: Breach notifications are often carefully worded to minimise legal exposure — request specific information about what data was accessed.
  • PCPD complaint mechanism: If you believe a data breach affecting you has not been properly notified or handled, file a complaint at pcpd.org.hk.
  • Dark web monitoring fills the gap: HIBP and other monitoring services often identify your breach exposure before any official notification — set up monitoring now.
Your rights under PDPO after a data breach →
Data breach discovery and notification timeline
4Responding as an Individual

What to Do When Your Data Is Involved in a Breach

When you receive a breach notification or discover through monitoring that your data has been exposed, the response should be swift and systematic. The specific actions depend on what data types were exposed, but the general priority order is: protect your financial accounts first, then secure your email (the master recovery pathway), then update credentials for other services. Don't wait for "more information" — act on the data types you know are exposed immediately.

If the breach involved your password: change it immediately on the breached service, and on every other service where you used the same or similar password. This is the critical step — password reuse transforms a single service breach into a credential stuffing toolkit that can be used across banking, email, and other services. Enable 2FA immediately on the breached account if not already active. If the breach notification says passwords were stored in plain text (rather than hashed), treat the exposure as critical-priority and change the password on all services where you may have reused it within 24 hours.

If the breach involved financial data (credit card numbers, banking credentials, account numbers): contact your financial institutions directly (HSBC, Hang Seng, or your bank's fraud line) to report the exposure and request card replacement or account security enhancement. Request enhanced monitoring on your accounts and ask about transaction alert settings. File a report with the HKPF CSTCB (18222) if you believe fraud has occurred or is likely — this creates a record and enables investigation. Monitor your TransUnion credit report for any unauthorised credit applications in the months following the breach.

  • Change exposed passwords immediately: Don't wait — change the exposed password on the breached service and every service where it was reused, starting with banking and email.
  • Enable 2FA on breached accounts: A breached password with active 2FA is far less useful to attackers — enable authenticator app 2FA where not already active.
  • Contact banks for financial data exposure: Report card or account number exposure to your bank's fraud line (HSBC: 2233 3000) — they can issue new cards and add monitoring.
  • Monitor credit report: Check TransUnion credit report 30, 60, and 90 days after any breach involving personal identity data.
  • Report to PCPD if concerned: If the breached organisation is Hong Kong-based and you believe they mishandled your data, file a complaint with the Privacy Commissioner at pcpd.org.hk.
  • Update dark web monitoring: Add any newly identified email addresses or phone numbers from the breach to your HIBP monitoring and password manager.
Complete credentials stolen action plan →
Data breach response for individuals
Don't Wait for a Breach Notification — Monitor Now

Don't Wait for a Breach Notification — Monitor Now

Since you'll often learn about a breach from monitoring before the official notification, setting up active monitoring is the best preparation you can make.

Related VPN Articles