Imagine the Dark Web as an iceberg. The part above the water is the web, where you can find webpages using search engines such as Google and Bing.
The part that is below its surface is known as the “dark web” or “deep web”. Search engines have no place here and they will not bring you to any of the pages. The common browser such as Google Chrome, Mozilla Firefox and Internet Explorer will not get you there; you need a special browser such as Tor. One of the main features of Tor is that disguises the computer that is being used to reach the internet, providing a high degree of privacy. While Tor can be used to go anywhere on the internet, if an address ends with “.onion” it’s in the dark web.
The dark web sounds like a scary place, but not everyone there is up to no good. It’s used by whistle-blowers, investigative journalists, people organizing against repressive governments, law enforcement agencies, and others who need to shield their identities and locations.
The platform focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals. We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily.
While we can’t say definitively that the data we’ve discovered has already been used to exploit your organisation, the fact that we are able to identify this data should be very concerning. Organisations should consult their internal or external IT and/or security teams to determine if they have suffered a cyber incident or data breach.
- Dark Web Chatroom: compromised data discovered in a hidden IRC;
- Hacking Site: compromised data exposed on a hacked Website or data dump site;
- Hidden Theft Forum: compromised data published within a hacking forum or community;
- P2P File Leak: compromised data leaked from a Peer-to-Peer file sharing program or network;
- Social Media Post: compromised data posted on a social media platform;
- C2 Server/Malware: compromised data harvested through botnets or on a command and control (C2) server