Protect your business from common scams, real …
Protect Your Online Business from the Most Common Scams Digital scams are a growing and constant …
read moreIf you’re one of those people receiving calls from unknown numbers offering products you don’t want, dozens of spam emails daily, or promotional text messages you never signed up for, you’ve probably asked yourself more than once: where the hell did they get my data from?
This is one of the most common questions people ask, and the answer is, I’m afraid, more concerning than you might imagine. It’s not just about annoying messages in your inbox—it’s a structural problem affecting your privacy, digital identity, and even your security. Personal data is the oil of the 21st century, and there’s an entire underground industry dedicated to extracting, trading, and exploiting it without your consent.
In this article, we’ll explore the main sources from which your personal data originates when it falls into the hands of spammers and cybercriminals. We’ll see why negligent management of this information represents an enormous risk not only for individuals but for society as a whole. And most importantly: I’ll give you practical recommendations to minimize your exposure and protect yourself, along with a critical reflection on the responsibility of our public institutions in this mess.
Before diving into specific sources, it’s important to understand the magnitude of the problem. Your personal data has real commercial value in both legal and clandestine markets. Your email, phone number, address, date of birth, consumer preferences, medical history, or financial information are constantly bought and sold in databases that change hands between companies, intermediaries, and eventually, cybercriminals.
What started as “legitimate” direct marketing has evolved into a complex ecosystem where the boundaries between legal and illegal are increasingly blurred. And in the middle of all this, there’s you: the product, not the customer.
If there’s a short answer to the title question, it’s this: stolen or leaked databases. This is, by far, the most common and dangerous source of personal information for spammers and cybercriminals.
Every year, thousands of security breaches occur in companies, organizations, and digital platforms. Some are public and make headlines, but most go unnoticed. When attackers compromise a company’s systems, they’re not usually looking for money directly (though sometimes they do), but something much more valuable in the long term: complete databases with information on millions of users.
These databases can contain:
Once stolen, these databases are sold on clandestine forums on the dark web or openly shared in cybercriminal communities. Prices vary depending on data quality and freshness: from a few dollars for thousands of generic records to many thousands of dollars for highly specific and verified information.
Notable examples of massive breaches:
These aren’t exceptions—they’re the norm. Sites like Have I Been Pwned allow you to check if your email or phone appears in any of the over 600 publicly documented breaches, but there are thousands more that go unreported.
This is where things get especially concerning, and it’s rarely discussed with the seriousness it deserves. Governments and public administrations handle massive amounts of sensitive citizen data: from electoral rolls to medical records, tax returns, property registers, court files, and more.
The problem is that many public administrations have cybersecurity systems decades behind the private sector. Limited budgets, obsolete infrastructure, lack of qualified personnel, and an organizational culture that doesn’t prioritize digital security create the perfect breeding ground for massive leaks.
SEPE Breach (2021): Spain’s Public Employment Service suffered a massive cyberattack by Ryuk ransomware that compromised data from millions of job seekers, paralyzing the system for weeks. Exposed information included names, national IDs, addresses, bank account numbers, and employment status. The attack left both 710 physical offices and 52 online offices across the country out of service.
Public Hospital Breaches: Various public health system hospitals have suffered ransomware attacks that exposed complete medical records. Notable cases include Hospital Clínic de Barcelona (2023) where 4.5 terabytes of patient and staff data were stolen, Hospital Central de Asturias, and three hospitals in Catalonia in 2022. This type of medical information is extremely sensitive and valuable in clandestine markets.
Ministry of Defense, Civil Guard, and Armed Forces (2025): Early 2025 saw one of the most sensitive breaches of the year: the leak of personal data from approximately 180,000 members of the Armed Forces, Civil Guard, and Ministry of Defense personnel. User accounts and emails were put up for sale on a cybercrime portal, compromising critical national security information.
Badajoz City Council (2025): In April 2025, Badajoz City Council suffered a devastating ransomware attack attributed to the LockBit group that left all its computer systems completely inoperative. Electronic procedures were suspended for several days, paralyzing citizen services and compromising sensitive local administration data.
Trusting your data to public administration doesn’t guarantee its safety. In fact, in many cases, administrations are the weakest link in the chain, as they’re a very attractive target for cybercriminals given the sensitivity of the data they handle. And here’s the most frustrating paradox: these same institutions legally force you to provide your data for procedures, services, and tax obligations, but then don’t allocate sufficient resources to protect it adequately.
Not all personal data comes from spectacular thefts. A significant amount is obtained simply by collecting information you yourself make public on the internet, but in a massive and automated way through web scraping techniques. Generally, you won’t have published your phone number online, but this type of data about you allows for a more complete profile to be created and used later to target you.
Web scraping involves using bots and automated scripts to extract information from websites, social media profiles, professional directories, forums, and any platform where you publish data about yourself. Although much of this information is technically public, most users aren’t aware of how easily it can be collected, cross-referenced, and used against us.
Common scraping sources:
Once collected, this data is collated and consolidated into databases sold to marketing companies, data brokers, and eventually ends up in spammers’ hands.
There’s an entire legal (or at least legal gray area) industry of data brokers that collect, aggregate, and sell personal information. These companies obtain data from public sources, surveys, online forms, loyalty programs, apps, etc., and share or sell them to third parties.
When you sign up for a “free” app, accept a coupon site, participate in an online survey, or download a flashlight app for your phone that requests excessive permissions, you’re very likely feeding this industry.
The terms and conditions that nobody reads usually include clauses allowing these companies to share your information with “business partners”—a euphemism for saying they’ll sell your data to the highest bidder. Although you’ve technically “consented,” the reality is that most users aren’t aware of the magnitude of what we’re giving away.
Not all data exposures result from sophisticated attacks. A surprising amount of personal information leaks simply through negligence, incompetence, or poor security practices:
Every time you make an online purchase, sign up for a digital service, or download an app, you’re trusting your data to a company whose security practices you probably know nothing about.
Many small online stores and startups don’t have the resources or experience to implement robust security measures. They use insecure payment systems, store passwords without encryption, or don’t update their platforms, leaving them vulnerable to known attacks.
Free mobile apps are especially problematic. Many collect excessive information (contacts, location, call history, photos) that they don’t need to function, and then sell or leak that information.
Social media platforms aren’t just vulnerable to scraping—they actively collect, analyze, and monetize your information. Every “like,” every search, every message, every location you share contributes to a detailed profile of you that’s sold to advertisers.
But the problem goes further. Many apps request permissions they don’t need. A recipe app doesn’t need access to your contacts, microphone, and GPS location, but many request it anyway. And if you accept, that information can end up in anyone’s hands.
Receiving unwanted communications is annoying, but the consequences of your personal data circulating freely go far beyond a full inbox.
With enough personal information, cybercriminals can:
It’s increasingly difficult to keep aspects of your life private when multiple leaked databases can be cross-referenced and correlated to build an extremely detailed profile of you:
This information can be used to manipulate you, discriminate against you in job selection processes, increase prices based on your ability to pay, or even blackmail you.
Leaked information can compromise your physical security. Knowing your address, routines, when you’re traveling (social media posts), or your economic situation can make you vulnerable to theft, harassment, or worse threats.
When you constantly experience negative consequences from sharing information online (spam, unwanted calls, scam attempts), trust in the digital ecosystem erodes, limiting your ability to take advantage of legitimate and useful services.
Now that you understand where your data comes from when it falls into the wrong hands, let’s talk about what you can do to minimize the damage.
A fairly common recommendation that turns out to be surprisingly effective, though not foolproof, is: use fictitious information in non-critical contexts.
The idea is simple: not all internet services deserve your real data. If you’re signing up for a site you’ll only use once, a small online store of dubious reputation, or an app that asks for unnecessary information, consider providing false or partially false data:
Important warning: This strategy only works if you don’t already have all your real data scattered across the internet. If you’ve been using your real information on hundreds of services for years, the damage is done. But for new registrations, creating a layer of false information makes it harder for cybercriminals to identify which information is truly yours when cross-referencing databases.
It’s also essential to never use false information in legal, banking, medical, or government contexts where doing so could constitute fraud.
These are practices you should always apply:
Always ask yourself: do I really need to register here? Does this service truly require my phone number, date of birth, or address? Many times we can access content or features without creating an account—we just find it more convenient to register.
There’s a global trend toward digitalization of public services. In theory, this should make our lives easier: online procedures, telemedicine appointments, 24/7 service access, less physical bureaucracy. And in many ways, it does.
But digitalization without proportional investment in cybersecurity is a ticking time bomb. We’re centralizing massive amounts of sensitive information from millions of citizens in systems that:
When one of these systems is compromised, as we’ve seen in the examples above, the consequences affect entire populations. And the worst part: there are rarely clear consequences for those responsible for these security deficiencies.
The question “where do spammers get my data from?” has many uncomfortable answers: from massive security breaches to automated scraping, from data brokers to government negligence. But they all point to a fundamental reality: your personal data circulates on the internet in quantities you probably never imagined, and the consequences go far beyond annoying emails.
The good news is that you’re not completely defenseless. Adopting digital hygiene practices, being selective about what information you share and where, using privacy tools, and applying strategies like fake information in non-critical contexts can significantly reduce your exposure.
But it’s also essential to understand that the complete solution can’t depend solely on individual actions. We need to collectively demand that the institutions forcing us to hand over our data assume real responsibility for protecting it with investment, transparency, and clear consequences for negligence.
The digital age has brought us enormous benefits, but also unprecedented risks to our privacy and security. Taking control of your personal information isn’t paranoia—it’s common sense in 2025.
The next time you receive that spam email or that unwanted promotional call, you’ll know exactly where your information came from. And more importantly, you’ll know what to do about it.
Happy Hacking!
That may interest you
Protect Your Online Business from the Most Common Scams Digital scams are a growing and constant …
read moreThe best decision you can make as a Windows user isn’t to wait for Microsoft to improve, but …
read moreAs databases grow larger and more complex, managing and accessing data efficiently becomes …
read more