Hackers have different motivations. Depending on the situation, your data may be safe even after it’s been breached.
Common motivations for cyber-attacks
Showcasing their skills
Organisations typically have cyber security measures in place and some hackers may see it as an opportunity to showcase their skillset. Their intent may not be to steal your details but rather to gain notoriety or publicity. In these instances, it’s likely they’d broadcast the attack to either the company itself, the media or online communities.
Ransom
You guessed it, these attackers are chasing a profit. The hacker generally obtains valuable data that would cause the company harm if made public – holding them to ransom in order to regain it. In these instances, the company is the target as opposed to the personal data.
On-selling your data
This one is arguably the most harmful, as it can go unnoticed if companies don’t have the right monitoring tools in place to detect a breach. The objective is the data itself, and the attacker will go to great lengths to ensure they’re undetected for as long as possible. The stolen data is then sold to the highest bidder for other criminals or scammers to use. This is what’s believed to be happening with Optus’ data breach right now.
Though hackers may have different motivations it’s important to take precautions to minimise the chance of attacks and breaches.
Why do they want my data anyway?
We all know that data is valuable, but is it valuable enough to risk criminal charges for? Unfortunately, yes. By knowing just a few details about you, a scammer can steal your identity and do things like:
- Apply for credit cards in your name
- Open bank accounts in your name
- Add their own contact or bank details in your utility accounts and request refunds
Be prepared in case your data is leaked
You can get ahead of the game and set yourself up with extra protection so if you are part of a data breach, you’re less at risk. Here are just a few simple ways to keep yourself safe online:
Choose strong passwords and get a password manager
Never use the same password on more than one platform. Easier said than done, we know. We’ve all thought about smashing the keyboard in frustration trying to remember which password we used for what. That’s where password managers like Bitwarden, 1Password or LastPass can help. These tools generate and save all your passwords, and all you need to remember is one password to access them.
Set up 2FA (two-factor authentication)
Two-factor authentication makes you identify yourself in two different ways before you can make any changes to your account. The first step is entering your login and password details and the second step is usually verifying your identity with something in your personal possession, like your phone. The most common example of this is receiving an SMS with a unique pin that you need to enter before gaining full access to an account.
Use credit and identity protection services
Clearscore has a free service that notifies you if your passwords have been found on the dark web. You can also subscribe to services like Equifax, which offers alerts plus some level of insurance against identity theft, or the CreditSavvy app, which helps prevent new credit from being taken out in your name by blocking credit checks.
Keep an eye on all your accounts
Scammers are getting smarter and smarter and it’s not just banks they’re targeting. Make a habit of regularly reviewing your expenses and checking for any payments you didn’t make. It’s also wise to keep an eye on your utility accounts for any refunds you didn’t request. If you’re an Origin customer, you can do this in the Bills and payments section of My Account. Be sure to contact your provider immediately if you see anything fishy.
My details were in a breach, what do I do?
These simple steps can help minimise the damage:
Change your password
Change your password immediately on the platform that’s been compromised. Also make sure all your contact details are still correct such as your name, email and your mobile number. Check your contact details before you change the password, as it’s a common tactic for scammers to change your details to their own.
Consider blocking or replacing your bank cards
If you’re concerned that your financial information was involved in a data breach, you can block or replace your debit or credit cards. This can usually be done via your banking app or by contacting your bank. Check for any transactions that you don’t recognise, especially small amounts, and advise your bank immediately should you notice anything suspicious. If you have direct debits set up for your utilities, don’t forget to update your details with your provider. If you’re an Origin customer, you can do this easily in My Account or the app.
Get a credit report ban ASAP
A credit report ban is a quick and effective way to help avoid fraudulent credit being taken out in your name. Services such as CreditSavvy allow you to place a ban on your credit report to temporarily freeze your file so credit checks can’t be completed. It’s completely free.
Replace your driver’s licence
If there’s a danger your driver’s licence number has been leaked, you should consider contacting the licencing authority in your state for a replacement.
Help is available if your identity is stolen
In the worst-case scenario there are services you can reach out to for help:
IDcare
IDcare is a national support centre for victims of identity crime. It’s a free service to assist victims with repairing damage to their reputation, credit history and identity information. For more information visit the IDcare website or call 1800 595 160.
Victims of Commonwealth identity crime
If you have been a victim of identity theft, you may be eligible for a Commonwealth Victim’s Certificate. It’s a document that you can present to financial institutions or other organisations to support your claim that your identity has been used fraudulently.
These are just a few simple ways you can help protect yourself in the event of a data breach. At Origin, we take our responsibility to keep your personal data safe very seriously, and we have a highly experienced team of cyber security experts. We do regular checks of our systems to identify and fix security vulnerabilities, and our Bugcrowd bug bounty program rewards cyber security researchers and white hat hackers for finding and reporting vulnerabilities in our software.
If you’d like more information on how we hold and use your personal data, visit our Privacy page.



