Back to overview

10 Personal Data Points Cybercriminals Can Find About You

For executives, VIPs and high-profile individuals: A systematic overview of critical data categories

July 14, 202512 min read

The Underestimated Digital Fingerprint

Executives live in a paradox: On one hand, they must be visible – for business, networks, and their professional reputation. On the other hand, this very visibility makes them attractive targets for cybercriminals, fraudsters, and other malicious actors.

What many don't realize: Just ten data categories are enough to create a detailed profile that can be exploited for identity theft, social engineering, or targeted attacks.

This data is often easier to find than you think.

At corma, we analyze daily what information about high-profile individuals can be found online. The results are revealing – and sometimes alarming.

The 10 Critical Data Categories in Detail

1Mobile Phone Numbers and Email Addresses

What attackers find:

  • Current and historical mobile numbers
  • Business and private email addresses
  • Links to online accounts and services

Common sources:

  • Data brokers and commercial databases (often the most valuable source)
  • Outdated contact information on websites
  • Leaked address books and contact lists
  • Whois databases for domain registrations

Risk assessment: HIGH

This data enables direct contact and serves as the foundation for phishing attacks and social engineering.

Immediate protection:

Use separate email addresses for public and private purposes. Regularly check archived website versions for outdated contact data.

2Residential and Business Addresses

Risk assessment: HIGH

Addresses enable not only unwanted contact attempts but also the planning of physical attacks.

3Professional Information and Career Details

Risk assessment: MEDIUM-HIGH

This information helps attackers develop credible pretexts for social engineering.

4Family Information and Personal Relationships

Risk assessment: VERY HIGH

Family information provides emotional pressure points for extortion and can endanger the safety of your loved ones.

5Photos and Visual Content

Risk assessment: MEDIUM-HIGH

Photos can be misused for deepfakes and identity deception.

6Social Media Profiles and Online Activities

Risk assessment: HIGH

Social media profiles are a goldmine for attackers.

7Compromised Passwords from Data Breaches

Risk assessment: VERY HIGH

Compromised passwords enable direct access to your accounts.

8Interests, Hobbies and Recreational Activities

Risk assessment: MEDIUM

This information is used for personalized attacks.

9Movement Patterns and Routines

Risk assessment: HIGH

Movement patterns make you predictable and vulnerable.

10Online Identities and Pseudonyms

Risk assessment: MEDIUM-HIGH

Even supposedly anonymous online identities can be traced back to your real identity.

Risk Assessment: Evaluating Your Individual Threat Level

VERY HIGH (7-10 categories affected)

Immediate action required for systematic protective measures.

HIGH (4-6 categories affected)

Targeted optimization required.

MEDIUM (1-3 categories affected)

Basic precautionary measures are sufficient.

Your Next Steps

Download Free Checklist

Use our detailed checklist "My Digital Footprint - 20-Minute Self-Assessment" to systematically check which of your data could be at risk.

Professional Analysis

Have your digital security situation assessed by experts.

Do you have questions about your digital protection?

corma GmbH · Digital Close Protection

Hammer Str. 19 · 40219 Düsseldorf · Germany

Protect Yourself Proactively

Find out which of your data is already circulating online

10 Personal Data Points Cybercriminals Can Find About You | Digital Close Protection