Modules
Sign in
New Request

Data source locations & descriptions: where do we find data?

  • Dark Web Chatroom: compromised data discovered in a hidden IRC
  • Hacking Site: compromised data exposed on a hacked Website or data dump site
  • Hidden Theft Forum: compromised data published within a hacking forum or community
  • P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network
  • Social Media Post: compromised data posted on a social media platform
  • C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server.

Have more questions?

Contact us

Was this article helpful?
0 out of 0 found this helpful

Provide feedback for the Documentation team!

Browse this section