Users of peer-to-peer (P-to-P) file-sharing services may be sharing more than they bargained for, a former White House cybersecurity adviser warned Thursday.Security researchers have found thousands of files with sensitive information by searching through file-sharing networks, said Howard Schmidt, chief executive officer at R&H Security Consulting. Schmidt, who has also worked as chief security officer for Microsoft, made the comments during an SDForum seminar in Palo Alto, Calif., on Thursday.Medical records, financial information and router passwords have all popped up on P-to-P networks, often after users inadvertently share folders containing the data. “People don’t realize you’re not just sharing your music,” Schmidt said. “You’re sharing your personal files.”Millions of U.S. households still use P-to-P services, though the practice of illegally downloading music from these services has been on the decline, according to the NPD Group research firm. And with all of those possible victims, criminals see an opportunity to search these networks for sensitive information, Schmidt said. “These are real live search strings the bad guys are using: bank such-and-such statement for August, bank such-and-such May statement, account summaries, account stop payment, Internet scams, bank routing information,” he said.Some of the P-to-P searches have been more ominous, he added. “We’ve actually found people out there searching for how to make sarin gas.” Tiversa, a security company in Wexford, Pa., conducted the research. Schmidt is an adviser to Tiversa.Hackers have already evolved sophisticated techniques for using Google’s search engine to unearth data that has accidentally been exposed on websites. But with P-to-P hacking, attackers can get access to data on a victim’s desktop.“You can set something up for an hour, search for it, and you’re gone,” Schmidt said. He estimates that there are nearly four times as many P-to-P searches conducted each day as there are Google searches.Ironically, a U.S. law enacted to help fight identity theft may be helping the bad guys. The Fair Credit Reporting Act allows U.S. consumers to request a free credit report once every 12 months, but some P-to-P users are inadvertently sharing this information, Schmidt said. “They will go to the [free credit report] website, do all the validations necessary, download it on their desktop,” he said. “Well, what does it contain?… Some of them have full date of birth and all this other stuff: your credit cards, places you’ve lived, spouses’ names, and on and on.”Medical records are another source of concern. Researchers found one physician accidentally sharing 97 files with patient data on them, Schmidt said. “I don’t think if I was his patient, I would want this information out on any network, let alone a peer-to-peer network.” -Robert McMillan, IDG News Service (San Francisco Bureau)Check out our CIO News Alerts and Tech Informer pages for more updated news coverage. Related content brandpost Sponsored by SAP Generative AI’s ‘show me the money’ moment We’re past the hype and slick gen AI sales pitches. Business leaders want results. By Julia White Nov 30, 2023 5 mins Artificial Intelligence brandpost Sponsored by Zscaler How customers capture real economic value with zero trust Unleashing economic value: Zscaler's Zero Trust Exchange transforms security architecture while cutting costs. By Zscaler Nov 30, 2023 4 mins Security brandpost Sponsored by SAP A cloud-based solution to rescue millions from energy poverty Aware of the correlation between energy and financial poverty, Savannah Energy is helping to generate clean, competitively priced electricity across Africa by integrating its old systems into one cloud-based platform. By Keith E. Greenberg, SAP Contributor Nov 30, 2023 5 mins Digital Transformation feature 8 change management questions every IT leader must answer Designed to speed adoption and achieve business outcomes, change management hasn’t historically been a strength of IT orgs. It’s time to flip that script by asking hard questions to hone change strategies. By Stephanie Overby Nov 30, 2023 10 mins Change Management IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe