How are the stolen or exposed credentials found on the Dark Web ID?

Dark Web ID focuses on cyber threats specific to our client’s environments. We monitor the Dark Web and the criminal hacker underground for exposure of our client’s credentials to malicious individuals.
We accomplish this by looking specifically for our clients’ top-level email domains. When a credential is identified, we collect it. While we collect data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, and 600 Twitter feeds, and execute 10,000 refined queries daily.

Have more questions?

Contact us

Was this article helpful?
1 out of 1 found this helpful

Provide feedback for the Documentation team!

Browse this section