Dark Web monitoring and scanning explained
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
This blog was written by a third party author.
Shady deals often occur in darkness – criminal activities require secrecy to cloak their illicit nature. Today, you can find those dark places on the fringes of the internet, known as the Dark Web. More often than not, this is the place where cybercriminals go to monetize the data they’ve acquired as the result of a breach.
As the name suggests, Dark Web scanning works by searching the Dark Web to locate any stolen personal data and then alerting you if personal information is found for yourself or members in your organization. This enables you to then take the appropriate steps to help mitigate any potential damage/incidents. It should be noted that not all data exposed in data breaches ends up on the Dark Web, so if your data isn’t found this doesn’t guarantee that you haven’t been breached.
The Dark Web is host to all kinds of stolen personal information, from credit card details and bank account numbers, through to people’s personal log-in details for any number of web-based services, social security numbers, and even medical records. You’ll also find a broad brush of corporate data on there, such as customer lists, intellectual property, and employee usernames and passwords.
If your customer database is stolen, complete with email addresses, a would-be attacker could buy the list and then send out emails pretending to be from your company; this would potentially give them the credibility they need to execute a successful phishing attack and get their targets to share credit card information or online credentials. Alternatively, if your internal data is stolen, attackers can use employee log-on credentials to access corporate applications, systems, and networks to steal data, execute fraud, install ransomware, or use you as the go-between to target a larger partner or customer.
So, while we wouldn’t recommend people should visit this internet underworld any time soon, companies do need to keep an eye out for their data being traded on the Dark Web. Finding stolen user emails and passwords on the Dark Web can be a strong indicator that either your company, or a third-party application or website that your employees use, has been compromised. This puts your business at risk of further exploitation. A good Dark Web monitoring service can help you find this data online and stay one step ahead of your attackers.
The terms “Dark Web monitoring” and “Dark Web scanning” are often used interchangeably. The key difference being that scanning is invariably used to refer to the one-off activity of scouring the Dark Web. However, if this is offered as an ongoing service it would be referred to as Dark Web monitoring.
Dark Web monitoring protects organizations in a number of important ways:
On their own, security information and event management (SIEM) solutions act as collectors and organizers of key data gleaned from other sources, such as intrusion detection systems, network and system logs, and user activity monitoring solutions. This means that a standalone SIEM solution on its own would not provide Dark Web monitoring services.
However, most SIEM solutions do support integrations to other third-party data sources, and a Dark Web monitoring service could be included here. This would mean that companies have the ability to integrate the presence of Dark Web compromised credentials within their alerts in their SIEM solution. This could provide another layer of security check and could be an important trigger to instigate a password reset and then monitoring usage of that set credentials.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.