Dark Web Monitoring Coverage
Compromised Data
Includes details such as login, password, name, address, email & any other sensitive information
Data Breach Details
Known details of the data breach an employee has been involved in.
Breach Score
This score indicates how confident our research sta is that the data leak is from a credible source.
Passwords
Details of actual passwords found on the Dark Web, will be made available.
Our Penetration Test Certifications
Frequently Asked Questions
Dark Web functions primarily as a black marketplace where cyber criminals can sell or broker transactions involving compromised accounts, stoles employee PII data, corporate asset information, stolen credit card data, along with other illicit goods such as drugs, weapons etc.
Session hijacking (or cookie stealing) attacks can allow an attacker to bypass MFA via pre-authenticated sessions. The authenticated cookies remain valid until the user ends the session by logging out and closing the browser window. Attackers can steal the authenticated cookies and hijack the session, thus bypassing MFA. Attackers can sell these authenticated cookies on the Dark Web.
Corporate employee info can end up on the Dark Web in several ways. Some of the most common attack vectors to steal information or credentials are a phishing attack, a broader breach during a cyberattack, malware attacks via email or web, or ransomware attacks.
Dark Web functions primarily as a black marketplace where stolen data acts as a form of currency on the Dark Web. Bad actors broker stolen data to buy and sell to facilitate targeted corporate cyber-attacks, public data leaks, or initiate ransomware attacks.