corma Logo
Digital Close Protection
Back to overview

10 Personal Data Points Cybercriminals Can Find About You

For executives, VIPs and high-profile individuals: A systematic overview of critical data categories

July 14, 202512 min read

The Underestimated Digital Fingerprint

Executives live in a paradox: On one hand, they must be visible – for business, networks, and their professional reputation. On the other hand, this very visibility makes them attractive targets for cybercriminals, fraudsters, and other malicious actors.

What many don't realize: Just ten data categories are enough to create a detailed profile that can be exploited for identity theft, social engineering, or targeted attacks.

This data is often easier to find than you think.

At corma, we analyze daily what information about high-profile individuals can be found online. The results are revealing – and sometimes alarming.

The 10 Critical Data Categories in Detail

1Mobile Phone Numbers and Email Addresses

What attackers find:

  • Current and historical mobile numbers
  • Business and private email addresses
  • Links to online accounts and services

Common sources:

  • Data brokers and commercial databases (often the most valuable source)
  • Outdated contact information on websites
  • Leaked address books and contact lists
  • Whois databases for domain registrations

Risk assessment: HIGH

This data enables direct contact and serves as the foundation for phishing attacks and social engineering.

Immediate protection:

Use separate email addresses for public and private purposes. Regularly check archived website versions for outdated contact data.

2Residential and Business Addresses

What attackers find:

  • Current and previous residential addresses
  • Business headquarters and office locations
  • Holiday homes and secondary residences
  • Real estate ownership and property details

Risk assessment: HIGH

Addresses enable not only unwanted contact attempts but also the planning of physical attacks. They help criminals understand your habits and routines.

Immediate protection:

Use post office boxes for business correspondence.

3Professional Information and Career Details

What criminals find:

  • Current position and company
  • Career path and previous employers
  • Salary information and compensation structures
  • Business partners and industry contacts

Risk assessment: MEDIUM-HIGH

This information helps attackers develop credible pretexts for social engineering. They can impersonate business partners, vendors, or colleagues.

Immediate protection:

Limit professional details in public profiles. Use generic titles instead of specific position designations.

4Family Information and Personal Relationships

What criminals find:

  • Names of spouses and children
  • Schools and recreational activities of family members
  • Family relationships and contacts
  • Family habits and routines

Risk assessment: VERY HIGH

Family information is particularly dangerous as it provides emotional pressure points for extortion and can endanger the safety of your loved ones.

Immediate protection:

Avoid publishing family photos with identifiable details. Educate your family about social media risks.

5Photos and Visual Content

What criminals find:

  • Current and historical photos
  • Metadata with location and time information
  • Biometric data for facial recognition
  • Private moments and intimate images

Risk assessment: MEDIUM-HIGH

Photos often reveal more than you realize: whereabouts, habits, contacts, and private details. They can be misused for deepfakes and identity deception.

Immediate protection:

Remove metadata from photos before publication. Check your appearance in Google Image Search.

6Social Media Profiles and Online Activities

What criminals find:

  • Complete social media histories
  • Personality profiles and preferences
  • Political and social views
  • Contacts and network connections

Risk assessment: HIGH

Social media profiles are a goldmine for attackers. They provide deep insights into your personality, your habits, and your social environment.

Immediate protection:

Review all privacy settings. Limit personal information in public profiles.

7Compromised Passwords from Data Breaches

What criminals find:

  • Hacked passwords from databases
  • Email/password combinations
  • Reused login credentials
  • Security questions and answers

Risk assessment: VERY HIGH

Compromised passwords enable direct access to your accounts. Many people use the same passwords for multiple services – a critical mistake.

Immediate protection:

Use a password manager and unique passwords. Enable two-factor authentication everywhere possible.

8Interests, Hobbies and Recreational Activities

What criminals find:

  • Sports activities and club memberships
  • Collecting interests and hobbies
  • Vacation destinations and travel habits
  • Cultural and social interests

Risk assessment: MEDIUM

This information is used for personalized attacks. Attackers can pose as like-minded individuals and gain your trust.

Immediate protection:

Use pseudonyms in hobby communities. Be careful about disclosing personal details in interest groups.

9Movement Patterns and Routines

What criminals find:

  • Regular jogging or walking routes
  • Work and leisure routines
  • Frequently visited places and venues
  • Travel patterns and locations

Risk assessment: HIGH

Movement patterns make you predictable and vulnerable. Criminals can exploit your absence or target you at specific locations.

Immediate protection:

Deactivate automatic location sharing. Post activities with a time delay, not in real-time.

10Online Identities and Pseudonyms

What criminals find:

  • Alternative usernames and handles
  • Links between different identities
  • Private online activities under pseudonyms
  • Historical account connections

Risk assessment: MEDIUM-HIGH

Even supposedly anonymous online identities can be traced back to your real identity. These connections often reveal embarrassing or compromising details.

Immediate protection:

Use completely separate email addresses for different online identities. Maintain consistent anonymization practices.

Risk Assessment: Evaluating Your Individual Threat Level

VERY HIGH (7-10 categories affected)

Your digital fingerprint is comprehensive and dangerously detailed. Immediate action required for systematic protective measures.

HIGH (4-6 categories affected)

You are an attractive target with considerable attack surface. Targeted optimization required.

MEDIUM (1-3 categories affected)

Basic precautionary measures are sufficient, regular review recommended.

What Can You Do Now?

The good news: You are not helplessly exposed to this risk. With the right strategies, you can systematically reduce your digital attack surface.

At corma, we have learned through over 35 years of investigative experience: The best defense begins with understanding your own vulnerability. Only those who know what information about them is circulating online can take effective protective measures.

Your Next Steps

Download Free Checklist

Use our detailed checklist "My Digital Footprint - 20-Minute Self-Assessment" to systematically check which of your data could be at risk.

Professional Analysis

Have your digital security situation assessed by experts. In a confidential conversation, we clarify what concrete risks exist for you.

Do you have questions about your digital protection?

corma GmbH · Digital Close Protection

Hammer Str. 19 · 40219 Düsseldorf · Germany

In a world where information means power, ignorance about one's own digital presence is a risk that no one can afford.

Protect Yourself Proactively

Find out which of your data is already circulating online