Get Updates
Get notified of breaking news, exclusive insights, and must-see stories!

Digital Afterlife: The Rise of 'Ghost Hacking' and How to Protect Your Loved Ones' Online Legacy

Death of a near and dear one is devastating. In the case of the demise of a family member, one must make funeral arrangements while being drowned in the sorrow. But criminals are now looking for opportunities even in bereavement. In case of a death, we feel at times, I wish the departed person comes back, imagine getting a message from the person's Instagram or Facebook account!

Welcome to the unsettling world of "ghost hacking," a macabre twist in the cybercriminal playbook that preys on the bereaved and exploits. They employ tactics to use the digital footprints we leave behind. These fraudsters keep a close tab on announcements of deaths. Usually, people tend to publish the news of demise in newspaper or on social media platforms. It's a solemn way of paying homage and show respect for the departed soul. But the cyber criminals take advantage of this. They track down the social media accounts of the person who died using the information like date of birth etc. Employing hacking tools, they take charge of the social media handle and start sending messages on the contact list, asking for money, or sending duplicitous links to entrap them. This chilling form of exploitation can turn the grief of losing a loved one into a nightmare of financial and emotional distress.

The Rise of Ghost Hacking

Targeting family members and friends is just one part of the crime. These cybercriminals use the identities of the deceased to apply for loans, credit cards, or access financial accounts. The accounts of individuals who have passed away are perfect targets because they're often left unattended. The family members, drowned in sorrow are busy preparing for the last rites and coming to the terms with the grief. Deactivating social media accounts or taking charge of the bank accounts aren't on their mind at the moment. The criminals use this as a window of opportunity to bleed them financially.

How can we avoid 'Ghost Hacking'?

We can take several steps to safeguard the digital presence of the dead person. Many platforms have specific processes in place to help families memorialise accounts after a person has passed. After providing the documentation Facebook would lock the account and no one can login or tamper. The account similarly can also be deleted as per valid request. On Instagram and X (formerly Twitter), similar procedures exist to either memorialise or remove the accounts of the deceased.

In addition to social media, the next of kin should ensure all financial accounts are closed or transferred to the appropriate person. Ghost hackers can use this information to open fraudulent credit lines, apply for loans, or make purchases under the deceased person's name.

Similarly, care must be taken about the phone. Apple's Legacy Contact feature allows users to designate trusted individuals who can access their data after they pass away. Similarly, Google's account settings let users specify who can access their data, or if the account should be.

Clearly knowledge is the best tool. While users should be careful, it is also incumbent on the tech firm's to be more proactive and explain these features. It is also for the government to make the handling of the financial aspects by the families easier and more efficient.

Notifications
Settings
Clear Notifications
Notifications
Use the toggle to switch on notifications
  • Block for 8 hours
  • Block for 12 hours
  • Block for 24 hours
  • Don't block
Gender
Select your Gender
  • Male
  • Female
  • Others
Age
Select your Age Range
  • Under 18
  • 18 to 25
  • 26 to 35
  • 36 to 45
  • 45 to 55
  • 55+