- Tested: the compromised data was tested to determine if it is live/active;
- Sample: the compromised data was posted to prove its validity;
- Keylogged or Phished: the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;
- 3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;
- Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to Peer site;
- Malicious / Doxed: the compromised data was intentionally broadcast to expose PII.
Identified method used to capture/ steal data: how was the data stolen or compromised?
Have more questions?
Provide feedback for the Documentation team!
Browse this section
- What does password criteria mean?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Data source locations & descriptions: where do we find data?
- How are the stolen or exposed credentials found on the dark web?
- How does Dark Web ID help protect my organization?
- What is the dark web?
- What does it mean when a password has a long series of random numbers and letters?
- What is the difference between a privileged user and standard user?
- See more