A few years ago, a friend of mine got a call from her bank about a fraudulent charge — $12.99 for a streaming service she'd never heard of. Small, easy to dispute. But it kicked off three months of chaos: a replacement card, a drained savings account linked to the old one, and eventually the discovery that her email address and password had been sold in a batch of 200 million credentials from a breach she had no idea she was part of.
The company that got hacked? They never told her.
The first 48 hours nobody talks about
When a company gets breached, the clock that matters isn't the one they're using to notify you. It's the one the attacker started the moment they got in.
Most breaches aren't discovered the day they happen. According to IBM's Cost of a Data Breach Report, the average time to identify and contain a breach is around 258 days. That's eight months of your data potentially circulating before anyone sends you a "we take your privacy seriously" email.
In that window, here's what actually happens to your stolen data: it usually doesn't get used immediately. Attackers often sit on fresh data or sell it in bulk to brokers who specialize in sorting and validating it. Your email and password get tested against dozens of other sites automatically — a process called credential stuffing — before anything flashy happens.
Your data has a market price. It's probably lower than you think.
This is the counterintuitive part most breach articles skip: your individual data isn't worth much.
A full identity profile — name, SSN, date of birth, address — sells for roughly $10 to $25 on dark web markets, sometimes less if it's old or from an oversaturated breach. Your credit card number with CVV might fetch $5. According to Privacy Affairs' Dark Web Price Index, hacked social media accounts often sell for under $50.
What this means for you is that the threat isn't usually a targeted criminal who wants you specifically. It's automation — scripts running your credentials against thousands of sites at once, or bots probing for accounts tied to valuable services like cryptocurrency exchanges or airline miles.
Your data is commodity, not target. That changes what you should actually worry about.
The real danger is the chain reaction
The breach itself isn't the problem. The chain reaction it enables is.
Say your email and an old password leaked from a forum you signed up for in 2017 and forgot about. If that password is anywhere close to what you use now — same base word, different number at the end — automated tools will figure that out. They're built for it.
From your email, an attacker can trigger "forgot password" flows on your other accounts. From your other accounts, they can find financial information, real address data, or access to connected services. This is why the forum breach that seems irrelevant can become the thread that unravels everything.
What you should actually do, step by step
Stop thinking in terms of "was I in the breach" and start thinking about blast radius.
First, go to HaveIBeenPwned.com right now and enter your email. This site, maintained by security researcher Troy Hunt, indexes breach data and tells you specifically which data sets your email appeared in. It's free and doesn't store your search.
If you're in one, here's the sequence that actually matters:
- Change the password on that breached account — but only after you've changed your email account's password first. Email is the master key.
- Turn on two-factor authentication on your email, using an authenticator app (not SMS if you can avoid it — SIM swapping is a real attack).
- Search your inbox for the word "welcome" to surface every service you've ever signed up for. Change credentials for anything financial or health-related immediately.
- Freeze your credit at all three bureaus — Equifax, Experian, TransUnion. This is free and blocks anyone from opening new credit lines in your name. Unfreeze only when you need to apply for something, then refreeze.
A credit freeze is the one action that actually stops new-account fraud cold. Almost nobody does it until after something bad happens.
The notification you receive is not for your benefit
When a company sends you a breach notification email, it often arrives weeks or months after the incident. Legal teams have reviewed every word. The language is calibrated to minimize liability, not maximize your ability to respond quickly.
According to the Identity Theft Resource Center, many breach notices omit key details — like what specific fields were exposed, whether passwords were hashed or stored in plain text, or how long the breach window lasted. You are often getting the legally minimum viable disclosure.
Read the notification for what they don't say as much as what they do. "Encrypted passwords" with no mention of hashing algorithm means you don't actually know how exposed you are. "No financial data was accessed" sometimes means financial data wasn't stored there — not that it wasn't sought.
The honest caveat
None of this fully protects you, and pretending otherwise would be dishonest.
If a company stores your data in plain text, or gets breached by a sophisticated state-level actor, or if you've used the same password across accounts for years — there's no single action that reverses that exposure. The freeze helps. The password manager helps. The 2FA helps. But some of the data from old breaches is already out there, indexed, and will be for a long time.
What you're doing when you take these steps isn't eliminating risk. You're making yourself a harder target than the next person. In a world of automated, bulk attacks, that's often enough.
Sources:
- IBM Security
- Privacy Affairs
- Identity Theft Resource Center






.jpg)