Dark Web ID focuses on cyber threats specific to our client’s environments. We monitor the Dark Web and the criminal hacker underground for exposure of our client’s credentials to malicious individuals.
We accomplish this by looking specifically for our clients’ top-level email domains. When a credential is identified, we collect it. While we collect data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, and 600 Twitter feeds, and execute 10,000 refined queries daily.
How are the stolen or exposed credentials found on the Dark Web ID?
Have more questions?
Was this article helpful?
Provide feedback for the Documentation team!
Browse this section
- I see fake emails (false positives). Why is this important?
- How are the stolen or exposed credentials found on the Dark Web ID?
- What is the Dark Web?
- What does password criteria mean?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Data source locations & descriptions: where do we find data?
- How does Dark Web ID help protect my organization?
- What is the dark web?
- See more