June 11, 2024 By Jonathan Reed 3 min read

Christie’s, one of the world’s leading auction houses, was hacked in May, and the cyber group RansomHub has claimed responsibility. On May 12, Christie’s CEO Guillaume Cerutti announced on LinkedIn that the company had “experienced a technology security incident.”

RansomHub threatened to leak “sensitive personal information” from exfiltrated ID document data, including names, dates of birth and nationalities. On the group’s dark website, RansomHub claims to possess 2GB of data on “at least 500,000” Christie’s clients from around the world.

RansomHub then set a deadline for Christie’s to pay an unspecified ransom amount. But the cyber group said that the auction house “ceased communication midway through” negotiations. So RansomHub held its own auction and sold the stolen data to an anonymous third party for an undisclosed sum.

Cyberattacks involving stolen personal data are by no means new, but Christie’s high-level clientele makes this incident stand out among others.

High-level client list at risk

The recent Christie’s attack brings to mind a past incident involving a multinational hotel chain. In 2018, the hotel chain informed customers of a data breach resulting in the possible disclosure of 500 million guests’ personal records, including information such as name, address, phone number, email address, date of birth, credit and debit card details, passport number, gender, arrival and departure information, reservation date and communication preferences stored in the brand’s global guest reservation database.

RansomHub claims it has access to Christie’s client information such as name, birthplace, ID number, birthdate and nationality. Christie’s requires individual buyers and sellers to provide a copy of a government-issued photo ID and proof of residential address according to its FAQ.

While the parallels between the hotel chain and Christie’s incidents are clear, the hotel chain hackers didn’t demand a ransom and none of the millions of valuable records were sold on the dark web; this was not a standard ransomware expedition. According to government sources, the hotel chain hack was part of a larger Chinese operation to collect data on American government employees and intelligence officers.

Read the Definitive Guide to Ransomware

Supercharging identity theft

In the age of AI deepfakes, identity theft reaches levels of trickery that are truly amazing. Not only are deepfake audio and video already being used for fraudulent bank transactions, but fake ID cards are also being made by generative AI. For example, the underground outfit OnlyFake claims that the IDs it produces can bypass KYC (“know your customer”) checks at Binance, Kraken, Bybit, Huobi, Coinbase, OKX and Revolut.

Any victim of personal data theft could have their identity stolen. But incidents like the hotel chain and Christie’s hacks open up entirely unique scenarios. For example, one can imagine fake IDs being created to impersonate high-level government officials for espionage reasons.

High-profile ID theft

Undoubtedly, Christie’s has many high net worth and high profile clients. A deepfake mimicking a celebrity could be used for any number of campaigns, such as false advertisements or endorsements. Stolen personal info could be used to bolster such efforts. Fake IDs might be used to hack bank accounts or set up new accounts in the name of someone who had their personally identifiable information (PII) stolen.

Scammers can even contact cell phone service providers and impersonate a person to request a “port-out” of a phone number to a new SIM card. Meanwhile, SIM jacking scams call a phone provider and convince them to switch the number to a new device.

Once they have a cell phone number, scammers can use it to:

  • Intercept security protocols sent to your phone
  • Access financial and social media accounts
  • Receive and send messages
  • Make calls
  • Intercept one-time passwords (OTPs) used for bank account verification

All these kinds of scams are easier to execute with stolen personal data and AI-enhanced impersonation. Then, the contagion can spread. If a famous person gets a phone call or text from their famous friend (actually an imposter), social engineering attacks might occur among the rich, powerful and famous. The reality? Famous people have been having their identities hacked for years.

More from News

Recent CrowdStrike outage: What you should know

3 min read - On Friday, July 19, 2024, nearly 8.5 million Microsoft devices were affected by a faulty system update, causing a major outage of businesses and services worldwide. This equates to nearly 1% of all Microsoft systems globally and has led to significant disruptions to airlines, police departments, banks, hospitals, emergency call centers and hundreds of thousands of other private and public businesses. What caused this outage in Microsoft systems? The global outage of specific Microsoft-enabled systems and servers was isolated to…

White House mandates stricter cybersecurity for R&D institutions

2 min read - Federal cyber regulation is edging further into research and development (R&D) and higher education. A recent memo from the Office of Science and Technology Policy (OSTP) states that certain covered institutions will be required to implement cybersecurity programs for R&D security. These mandates will also apply to institutions of higher education that support R&D. Beyond strengthening the overall U.S. security posture, this move is also in direct response to growing threats posed by the People's Republic of China (PRC), as…

New memo reveals Biden’s cybersecurity priorities through fiscal year 2026

2 min read - On July 10, 2024, the White House released a new memo regarding the Biden administration’s cybersecurity investment priorities, initially proposed in July 2022. This new memorandum now marks the third time the Office of the National Cyber Director (ONCD), headed by Harry Coker, has released updated priorities and outlined procedures regarding the five core pillars of the National Cybersecurity Strategy Implementation Plan (NCSIP), now relevant through fiscal year 2026. Key highlights from the FY26 memorandum In the latest annual version…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today