Frequently Asked Questions (FAQs)
How are the
stolen or exposed credentials found on the Dark Web?
Dark Web ID focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals.
We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily.Where do we
find the data?
-
Dark Web Chatroom: compromised data discovered in a hidden IRC;
-
Hidden Theft Forum: compromised data published within a hacking forum or community;
-
P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network;
-
Social Media Post: compromised data posted on a social media platform;
-
C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server.
-
Dark Web Chatroom: compromised data discovered in a hidden IRC;
How was
this data stolen or compromised?
-
Tested: the compromised data was tested to determine if it is live/active;
-
Sample: the compromised data was posted to prove its validity;
-
3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;
-
Keylogged or Phished: the compromised data was entered into a fictitious website or extracted through software designed to steal PII;
-
Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to-Peer site;
-
Malicious / Doxed: the compromised data was intentionally broadcast to expose PII.
Is it
safe to say cloud storage is a serious concern for data breach? With most of our software tools moving to cloud
hosting, does this create more riski for my Company's IP?
There can be as much risk to your data
within a Cloud environment as there is
when it resides locally within your own
servers. When researching Cloud providers
and data centers, make sure you understand
their compliance and certification with
the security standards and protocols that
impact your industry. CSO Online maintains
a thorough list of security laws, regulations
and guidelines by type, follow this link
Are there
any speical credentials needed to investigate the Dark Web?
You do not need special permission to access
the deep or Dark Web. However, accessing the
deep or Dark Web requires the use of a “TOR”
browser and should only be done using a VPN encrypted tunnel. In general, we advise against attempting to
access
the Dark Web, as you do not want to expose your computer or organization to more loss of data.