Identity thieves lurking in P-to-P networks

A former White House security advisor warned that P-to-P networks are being used by identity thieves.

Users of P-to-P (peer-to-peer) file-sharing services may be sharing more than they bargained for, a former White House cybersecurity advisor warned Thursday.

Security researchers have found thousands of files with sensitive information by searching through file-sharing networks, said Howard Schmidt, chief executive officer at R&H Security Consulting. Schmidt, who has also worked as chief security officer for Microsoft, made the comments during an SDForum seminar in Palo Alto, California, on Thursday.

Medical records, financial information and router passwords have all popped up on P-to-P networks, often after users inadvertently share folders containing the data. "People don't realize you're not just sharing your music," Schmidt said. "You're sharing your personal files."

Millions of households still use P-to-P services, though the practice of illegally downloading music from these services has been on the decline, according to the NPD Group research firm.

And with all of those possible victims, criminals see an opportunity to search these networks for sensitive information, Schmidt said. "These are real live search strings the bad guys are using: bank such-and-such statement for August, bank such-and-such May statement, account summaries, account stop payment, Internet scams, bank routing information," he said.

Some of the P-to-P searches have been more ominous, he added. "We've actually found people out there searching for how to make sarin gas."

Tiversa, a security company in Wexford, Pennsylvania, conducted the research. Schmidt is an advisor to Tiversa.

Hackers have already evolved sophisticated techniques for using Google's search engine to unearth data that has accidentally been exposed on Web sites. But with P-to-P hacking, attackers can get access to data on a victim's desktop.

"You can set something up for an hour, search for it, and you're gone," Schmidt said. He estimates that there are nearly four times as many P-to-P searches conducted each day as there are Google searches.

Ironically, a U.S. law enacted to help fight identity theft may be helping the bad guys.

The Fair Credit Reporting Act allows U.S. consumers to request a free credit report once every 12 months, but some P-to-P users are inadvertently sharing this information, Schmidt said. "They will go to the [free credit report] Web site, do all the validations necessary, download it on their desktop," he said. "Well what does it contain?... Some of them have full date of birth and all this other stuff: your credit cards, places you've lived, spouses' names, and on and on."

Medical records are another source of concern. Researchers found one physician accidentally sharing 97 files with patient data on them, Schmidt said. "I don't think if I was his patient, I would want this information out on any network, let alone a peer to peer network."

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Robert McMillan

IDG News Service
Show Comments

Most Popular Reviews

Best Deals on PC World

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?