Lorem ipsum dolor sit amet consectetur adipiscing elit quisque faucibus ex sapien vitae pellentesque sem.

Strategy and Transformation Practice

72% of U.S. Senior Executives were targeted by cyberattacks between February 2023 and August 2024, according to a 2024 report by GetApp. While the success and impact of these attacks vary, one thing is clear: businesses are becoming harder targets. Through stronger employee awareness, governance, and tooling, attackers are being forced to evolve. As a result, they’re turning to executives’ personal lives, and families, as potential entry points. This includes leveraging personal data about spouses and children from data brokers and social media sites. Cybercriminals are launching SIM-swaps, phishing campaigns, and emotional extortion tactics designed to bypass corporate security through personal channels. In this new threat landscape, protecting executive leadership means protecting their households. Cybersecurity at the top must now extend from the boardroom into the home.

 In a troubling example of this, attackers turned to an executive’s child to gain access they could not get directly.

While this threat is pervasive amongst the general population, it’s particularly salient amongst high profile individuals and their families.

“Doxing”, as it’s commonly referred, is the malicious act of publicly revealing someone’s private information without their consent. This often involves the disclosure and sale of personally identifiable information (PII) on the dark web, where criminals buy and use it for identity theft, fraud, and targeted attacks.

Where is this information found?

Unfortunately, it can be found easily in a number of places. It could include public sources like LinkedIn, company bios, press releases, social media, etc. It can be found on Data broker sites that aggregate public personal information, including home address. Potentially found in “breach dumps” that include Email/password leaks and Dark web markets or public breach repositories.

 The information can be used in a number of attacks. One such attack is “SIM-swapping”, where they hijack a child’s phone number and impersonate them in emotionally charged calls to pressure the executive into approving actions like Multi-Factor Authentication (MFA) bypass. In some cases, attackers extort an executive’s child—threatening to expose personal information—to coerce them into installing malware, compromising the family’s home network. Additionally, threat actors use brokered family data to impersonate trusted loved ones via email or phone, executing pretexting attacks designed to trick executives into disclosing credentials or installing malware.

How can you protect yourself, your family, and your business?

SIM-swapping, spoofing, and phishing attacks often start with a child or spouse’s compromised phone or email.

Malware installed on a family member’s device can pivot into executive work networks or data.

Family members are often the weakest link in security, especially children.

Attackers often buy executive and family details from data brokers to impersonate or threaten.

As attackers increasingly target executives through their families, the protection of personal and household security is critical to reducing risks for the entire business. Securing family data, strengthening account protections, and improving cyber hygiene help close vulnerable entry points that could compromise corporate systems. AccessIT Group offers Digital Executive Protection, providing thorough OSINT reviews to identify exposed personal information and tailored digital security training for executives. These training courses include take-home materials for families, empowering them to maintain strong defenses and safeguard both personal and business assets.