A Study of Doxing, its Security Implications and Mitigation Strategies for Organizations Roney Simon Mathews Shaun Aghili, Dale Lindskog Information Systems Security Information Systems Security Concordia University College of Alberta Concordia University College of Alberta Edmonton, AB, Canada Edmonton, AB, Canada
[email protected] {shaun.aghili, dale.lindskog}@concordia.ab.ca Abstract—This research paper focuses on the impact of collection, publishing and use of personally identifiable intentional and unintentional exposure or leakage of sensitive information (PII) [2] by doxers, cause privacy implications. personal data elements that- when aggregated and used or Addressing these risks and mitigating them is challenging to disclosed in an unauthorized manner- could impact the both individuals and organizations. As such the focus of this employees of an organization. Doxing usually escalates to paper is on incorporating dox mitigation strategies, within an hacking, espionage and harassment. Such impacts could damage enterprise’s risk management framework. the reputation or competitive advantage of the organization; especially if the targeted employee is a senior management Personal information discussed in this paper refers to the executive. Threat agents use doxing to collect data undetected, exclusive containment of pieces of data (identifier, quasi- from targeted victims. Doxing is a mode of Open Source identifier or sensitive) that an individual may share on the Intelligence (OSINT), aimed at launching sophisticated attacks internet with a restricted group of people. These may be shared on individuals or employees of an organization, through the on blogs, social networking websites, surveys, and websites collection of personal information over time; as such, doxing is that require collection of user information for creating a considered an Advanced Persistent Threat (APT).