Hackers are using home office selfies to steal your personal data

Remote working selfies
(Image credit: Shutterstock / Roman Samborskyi)

The pandemic has been the source of plenty of memes and new internet trends, not least the remote working selfie, which involves people taking photos of their home office setup or video conferencing sessions.

However, a new blog post from security firm Sophos suggests cybercriminals are capitalizing on this new genre of selfie to steal a range of personal data that could be used to execute identity or financial fraud.

Unbeknownst to many, there are a variety of different ways that remote working selfies can expose personal information. For example, package labels in the background of photos could betray the person’s home address, while posters on the wall could reveal information about the individual’s hobbies that could be used to crack security questions.

Images of virtual birthday parties held over Zoom or Teams, meanwhile, could be used to narrow down dates of birth and collect the names of friends and family members.

According to Dr. Jason Nurse, Associate Professor of Cybersecurity at the University of Kent, who authored the blog post, “the variety of information that may be exposed in such contexts is endless”.

Remote working security

While the desire to share remote working experiences with others is perfectly natural, given the isolation imposed upon us in the past twelve months, remote working selfies have provided yet another way for hackers to capitalize on the pandemic.

The trend has also spawned a selection of new social media hashtags - such as #WorkFromHome, #RemoteWork and #HomeOffice - that can be used to isolate content that may contain useful nuggets of information, making the lives of criminals even easier.

“Fraudsters, scammers and other cybercriminals love when we share information about our lives, personal, or work-related, openly online,” wrote Nurse.

“While the sharing of [home office selfies] may seem harmless and even a must-do at the time, the reality is that we are, once again, falling into the age-old trap of oversharing online and overlooking the risks.”

And it’s not just personal information at risk; the remote working selfie is also responsible for leaking all manner of sensitive corporate data too.

“Analysis of images of home-working environments has revealed work email inboxes, internal emails, names of colleagues, private web pages, software installed on computers [and more],” Nurse added.

To ensure your social media posts don’t expose any sensitive or personal data, Nurse claims it’s important to be mindful of what’s in the background of your photos, to use a virtual or blurred background during video calls and to think twice before using popular remote working hashtags.

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
Cartoon illustration of multiple smartphones
Are you oversharing? These are the 10 pieces of information you don't want to give away – ranked
An illustration of a hooded hacker with an obscured face holding a large fingerprint against a red background.
ID theft – what happens when someone steals your identity
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
A light pink gift box with blush pink bow, red hearts and confetti on a pastel pink background.
How to spot Valentine’s Day scams - stay safe on this most special day with our security tips
Closeup image of an eye with a heart on a screen reflected within
Bad romance: how to take control of your dating data and avoid a clinch from a cyberstalker
Google Pixel Scam Detection warning
Common internet scams and how to avoid them
Latest in Security
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Data leak
Hacked Tata Technologies data leaked by ransomware gang
A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
Thousands of iOS apps found to expose user data and leak Stripe keys
China
Chinese hackers targeting Juniper Networks routers, so patch now
Google Chrome dark mode
Google updates Chrome extension rules to ban affiliate link injection without user action or benefit
Abstract image of robots working in an office environment including creating blueprint of robot arm, making a phone call, and typing on a keyboard
This worrying botnet targets unsecure TP-Link routers - thousands of devices already hacked
Latest in News
The Russo brothers posing for a photograph and Herman carrying a Volkswagen camper van in The Electric State
'We're optimists': AI enthusiasts Joe and Anthony Russo defend its use in movies and TV shows, but admit there are 'very real dangers' around its application
UK Prime Minister Sir Kier Starmer
UK PM says AI should soon replace civil servants
Xbox Copilot in Minecraft
Microsoft confirms Copilot can be tested by Xbox Insiders next month and shares new details about how the AI sidekick will enhance the player experience: 'It has to be about gameplay, it has to be personalized to you'
Eight Samsung TVs mounted to the wall showing different basketball games
Samsung is offering you 8 new TVs in one bundle for March Madness, in case you want to watch all games at once like a Bond villain’s lair
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
The Steam Logo on a mobile phone in front of a wall of games.
Today’s Steam Spring Sale features my absolute favorite game of all time - here's when the sale starts and all the key info