What action could NOT be taken by an attacker with stolen customer information from a hacked online store?

Enhance your data security knowledge with our Online Data Security Test. Utilize a wealth of questions and detailed explanations to prepare.

The action that could not be taken by an attacker with stolen customer information from a hacked online store is logging into the customer's account and changing details. This is primarily because the attacker may only have partial information, such as payment details or addresses, that does not necessarily include authentication credentials like passwords or multi-factor authentication tokens, which are essential for account access.

In most cases, online stores implement security measures that require more than just customer information for logging into an account. For instance, if an attacker holds personal data such as billing information or shipping addresses but does not possess the correct account credentials or access to the user's email for password resets, they would not be able to access the account to make changes.

The other options highlight actions that an attacker could typically perform with stolen information. For example, stealing a customer’s shopping cart can happen if an attacker impersonates a customer based on the data they possess. Similarly, making unauthorized purchases could be feasible if the attacker has access to payment methods linked to the account. Selling stolen information on the dark web is a common practice among cybercriminals, turning customer data into monetary gain without needing to log into any specific accounts.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy