We use our in-house database (aptly named 'DarkVault') of breached credentials. These have been sourced from infamous hacking forums on the dark web by our investigators to find credentials that threat actors could be using in their own attacks.
Our investigators are working hard to identify new breaches as and when they occur, ensuring our database is up-to-date with any new credential exposures related to your domain.
DarkInvader queries the database every 4 hours for every domain provided in the ThreatPortal, ensuring that if your domain appears in a breach, you’ll be notified as soon as possible.
POWERED BY HUMAN RESEARCH
ANALYSING ALL THE DATA
In addition to third-party breaches like Adobe and LinkedIn, our database also contains so-called ‘combo-lists’. These are lists that are traded on dark web forums which can’t be attributed to a single source, however, they contain potentially billions of email and password combinations for use in credential stuffing or phishing attacks. Furthermore, we also have a range of ‘spam lists’ which provide information on emails which are used by spammers to send out mass emails in an attempt to phish victims.
This is all to provide an accurate threat map of your brand’s exposure on these dark web hacking forums, so you can remain one step in front of the hackers.
HUMAN RESEARCH TEAM
As a researcher at DarkInvader, HZRD expertise lies in monitoring the DarkWeb, conducting OSINT investigations, and threat intelligence.
FIX THE THREATS
Our team are on-hand to offer you further advice and information if you need assistance remediating any discovered credential leaks. Not every business has a huge IT team on standby to fix issues and we understand that. One of our experts can jump on a call to walk you through the analysis and explain the steps mentioned in the remediation advice. Giving you the much needed peace of mind.