There is more to the internet than meets the surface!
Search engines like Google, BING and Yahoo only search 4% of the Internet – this is known as the Surface Web.
The other 96% of the Web consists of the Deep Web – a sublayer of the Internet that is not seen by conventional search engines (for example Databases, private Academic, Company, Government networks) and the Dark Web.
Beneath the Deep Web lies the Dark Web, the internet’s secret anonymous underside, accessible only by specialized web browsers.
Criminals use the dark web to trade ideas and as a marketplace for selling anything and everything illegal: drugs, weapons, illicit pornography, people’s personal information, and more.
The Dark Web is estimated to be 1.5 times larger than the surface web and is growing rapidly!
The Dark Web is linked to criminal intent and illegal content. When a hacker steals credentials or personal information (and there are many ways they can do this), the dark web is where it ends up being sold and potentially used to commit fraud.
Compromised user credentials are frequently sold in Trading sites, Chat rooms & Black Market sites. Typical prices for compromised credentials, range on the Dark Web between £0.75 for online services and £5.00 for corporate network usernames and passwords.
These compromised user credentials can then be used to:
Far too often, companies that have had their credentials compromised and sold on the Dark Web don’t know it until they have become a victim to cyber crime — but by then, it’s too late.
Our service is designed to help both public and private sector organizations detect and mitigate cyber threats that leverage stolen email addresses and passwords. Dark Web Monitoring leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other blackmarket sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII).
Dark Web Monitoring focuses on cyber threats that are specific to our clients’ environments. We monitor the Dark Web and the criminal hacker underground for exposure of our clients’ credentials to malicious individuals.
We accomplish this by looking specifically for our clients’ top level email domains. When a credential is identified, we harvest it. While we harvest data from typical hacker sites like Pastebin, a lot of our data originates from sites that require credibility or a membership within the hacker community to enter. To that end, we monitor over 500 distinct Internet relay chatroom (IRC) channels, 600,000 private Websites, 600 twitter feeds, and execute 10,000 refined queries daily.
Find out if your company data has been exposed on the Dark Web