털린 내정보 찾기 Find My Stolen Information

The importance of personal information has been around for a long time. However, the news that personal information has been stolen still comes out, which often makes us anxious.

Today, we will look at the Find My Information stolen service. In case you don’t know, we recommend that you familiarize yourself with the accounts you use frequently and periodically check them.

털린 내정보 찾기

order of writing

 

○ What is the stolen my information search service? 털린 내정보 찾기

○ How to use the stolen my information search service 좋은뉴스

▶ Go to the Find My Stolen Information homepage ◀

 

 

1. What is the stolen my information search service?
You may have heard that the SNS of famous celebrities was hacked. But it’s not just about other people.

 

Leakage of personal information (ID, password) of the general public is also happening more widely than expected.

 

The illegal market for trading such personal information in China and other countries has also grown tremendously.

 

Leaked information is highly likely to be abused for secondary crimes such as identity theft or voice phishing, so be careful.

 

Did you receive a phone call from team leader Kim Mi-young, who speaks with a slurred Korean-Chinese accent?

 

The Stolen My Information Find service is a service that checks whether personal information such as ID or password has been leaked.

 

Since 2021, the Personal Information Protection Commission and Korea Internet & Security Agency have been providing the service.

 

2. How to use the stolen my information search service
In order to check the leaked personal information, first access the stolen information finder service and click ‘Check Leakage Status’.

 

rob-my-information-find-service-homepage

 

Then, check the precautions, check ‘I agree’ to the collection and use of personal information, and proceed with user authentication by e-mail.

 

user-email-authentication

Enter the email address for user authentication and click ‘Send Verification Number’ to send the verification number to that email.

 

If you enter the sent authentication number, the recaptcha on the right is activated. If you check ‘I’m not a robot’, authentication is complete.

 

 

The last step is to check whether personal information has been leaked. You can check whether up to 5 accounts have been leaked per email. Enter your ID and password each and click ‘Confirm’.

 

Personal information-leakage-whether-inquiry

For reference, the account that uses the ID as an e-mail only needs to be entered before the ‘@’. Fortunately, there are no leaked records on the account I usually use. 😙

 

If you want to verify your account additionally, you can do so after a day. Please note that if you use two or more emails, you can re-authenticate and verify with another email account.

 

Frequently Asked Questions
1) How is the leaked personal information used?
It is mainly traded in the black market using the dark web, and voice phishing organizations that purchased it are using it for secondary crimes.

 

※ Dark web: A closed web environment that cannot be accessed with a general internet browser. Since it is impossible to trace, it is being abused for personal information or drug trafficking.

 

2) What should I do if personal information is leaked?
You must immediately access the site you signed up for and then change your password. Otherwise, there is a high possibility that other site account information will be further leaked.

 

In addition, it would be better to be more prepared for secondary damage, such as strictly following the personal information protection rules, right?

 

※ Personal information protection rules

 

Use a secure password that is difficult for others to know
Change your password periodically
Do not use the authentication method of entering your resident registration number
Using identity theft confirmation service
Do not transfer personal information (ID photo, resident registration number, etc.) via mobile phone such as KakaoTalk
Do not store personal information in cloud services
Do not make financial transactions on public computers such as Internet cafes
Do not download material from unknown sources
Don’t even click on suspicious emails

3) Is the personal information entered for inquiry safe?
The service uses one-way encryption technology (HASH), and it is destroyed immediately after inquiry, so you don’t have to worry.

 

 

So far, we have learned about the robbed Find My Information service, how to use it, and frequently asked questions. I hope this helps you protect your personal information.