Check Dark Web Leaks
Overview
The Dark Web Leaks and Public Data Monitoring dashboard provides visibility into breaches, compromised credentials, and exposed organizational data. It enables analysts to review severity levels, identify users at risk, and investigate malware-infected paths to proactively manage threats before they escalate into major incidents. This data comes from monitoring dark web forums, paste sites, credential dumps, and malware logs.
Event Coverage
The dashboard provides insights across multiple dimensions of leaked data:
Breaches by Severity – Breach titles, severity ratings, and affected user counts.
Dark Web Leaks Over Time – Timeline of leaks detected for trend analysis.
Passwords – Total number of compromised passwords identified.
Accounts – Total compromised accounts linked to monitored domains.
Users At Risk – List of users with leaked credentials and associated risk severity.
Impacted Domains – Domains affected by breaches, with the number of leaks per domain.
Logons From – Geographic origin of compromised login attempts.
Compromised Browsers – Browser families and versions associated with breaches.
Malware Missed By – Instances where malware bypassed endpoint or security systems.
Leaked Data Type – Types of data exposed (e.g., plaintext, hashed passwords).
Malware Infected Locations – Paths on infected devices tied to breach data.
Impacted URLs – URLs where leaked credentials were observed, including plaintext password counts.
Dark Web Search – Searchable view of leaked records, showing user details, breach name, and timestamps.
Key Fields
When analyzing Dark Web events, the following fields provide the most context:
user.name
– Username linked to leaked data. Example:user.name: Charlie.Cassette
breach.title
– Title or name of the breach incident. Example:breach.title: acme.corp
td.darkweb.domain
– Domain of the leaked email or credential. Example:td.darkweb.domain: gmail.com
td.darkweb.target.domain
– Targeted domain or login portal related to the credential. Example:td.darkweb.target.domain: https://ExampleDomain.com/signin
password.type
– Format of the leaked password (plaintext, hashed, salted). Example:password.type: plaintext
password.text
– Exposed password in plaintext (if available). Example:password.text: 123456
tenant
– Tenant/organization identifier. Example:tenant: acme
.
Dashboard Access
The Dark Web, Public Leaks dashboard consolidates all detected breaches, exposed credentials, and impacted domains into a single view for investigation.
From the Menu:
Open the Dashboards section in the Analyst Console.
Expand the INTEL category.
Select Dark Web Leaks From the Third Party.
Review leaks, breach trends, and impacted users.
Last updated