Dark Web ID focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily.
How are the stolen or exposed credentials found on the dark web?
Have more questions?
Was this article helpful?
Provide feedback for the Documentation team!
Browse this section
- What does password criteria mean?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- Data source locations & descriptions: where do we find data?
- How are the stolen or exposed credentials found on the dark web?
- How does Dark Web ID help protect my organization?
- What is the dark web?
- What does it mean when a password has a long series of random numbers and letters?
- What is the difference between a privileged user and standard user?
- See more