DARK WEB MONITORING

We are now introducing Dark Web Monitoring.

Our packages are below.

Our Dark Web Monitoring Packages

Core Package — Essential Coverage

Covers up to 15 assets.

Designed for: Small businesses and start-ups needing foundational protection.

Premium Package — Enhanced Visibility

Covers up to 30 assets.

Designed for: Growing businesses or mid-sized organisations seeking greater coverage.

Enterprise Package — Comprehensive Threat Monitoring

Covers up to 100 assets.

Designed for: Enterprises, regulated industries, or those with a high-risk exposure profile.

Core Package — Essential Coverage

Covers up to 15 assets

Designed for: Small businesses and start-ups needing foundational protection.

Features:

  • Leaked Credential MonitoringIdentifies usernames, emails, and passwords associated with your organisation that appear in known breaches, credential dumps, or on criminal marketplaces.
    Purpose: Enables early intervention to prevent account takeovers or internal compromise.
  • Stealer Log DetectionMonitors for credentials, browser data, and session cookies harvested by malware (e.g., Raccoon, RedLine) and circulated through dark web channels.
    Purpose: Alerts you to compromise even in the absence of a formal data breach, allowing you to contain insider or endpoint threats.

This entry-level package is designed to give smaller businesses a dependable early warning system for compromised credentials. It provides immediate insight into known exposure across criminal forums and marketplaces, helping you take decisive action before issues escalate.

Premium Package — Enhanced Visibility

Covers up to 30 assets

Designed for: Growing businesses or mid-sized organisations seeking greater coverage.

Includes all Core features, plus:

Illicit Networking

  • Markets – Tracks listings of stolen credentials, company data, or internal access for sale on underground marketplaces.
  • Forum Posts – Captures hacker forum discussions relating to your organisation, domains, or technologies in use.
  • Blog Posts – Monitors posts by cybercriminals discussing exploits, leaks, or tactics relevant to your organisation.
  • Profiles – Flags known or impersonated user profiles on dark web platforms using your brand, staff names, or key personnel.
  • Chats – Watches dark web chat services (e.g., IRC, Telegram) for conversations involving your organisation or sector.

Open Web

  • Pastes – Monitors paste sites (e.g., Pastebin) for data dumps, leaks, or threat actor notes that mention your assets.
  • Web Accounts – Detects credential exposures for your staff on third-party platforms.
  • Google-Indexed Leaks – Identifies publicly available but unintended indexed data, such as unsecured files or credentials.
  • Hosting Mentions – Scans for abuse of your hosting infrastructure or mentions of your organisation on questionable hosts.
  • Look-alike Domains – Flags suspicious domains that mimic your brand or domain name, potentially used for phishing.

Emerging Sources

  • App Store Monitoring – Detects malicious or spoofed apps on official and unofficial app stores using your brand or assets.

The Premium Package goes beyond surface-level monitoring. It provides wider situational awareness across both traditional dark web sources and the open web, making it ideal for organisations with broader digital footprints or compliance requirements.

Enterprise Package — Comprehensive Threat Monitoring

Covers up to 100 assets

Designed for: Enterprises, regulated industries, or those with a high-risk exposure profile.

Illicit Networking (Extended)

  • Ransomware Leaks – Monitors known ransomware group leak sites for mentions of your organisation or documents.
  • Infected Devices – Identifies listings of infected endpoints (including employee machines) on malware marketplaces or botnet logs.
  • Financial Data Exposure – Detects exposure of financial statements, account details, or transaction data linked to your company.

Open Web (Extended)

  • Source Code Exposure – Flags publicly posted code or repositories referencing your organisation, often found on GitHub or forums.
  • Misconfigured Buckets – Identifies exposed cloud storage (e.g., AWS S3, Azure Blob) containing company or client data.

Emerging Sources (Extended)

  • Botnet Monitoring – Tracks botnet command-and-control telemetry for connections involving your IP ranges or devices.
  • Docker Hub Monitoring – Monitors for impersonated or malicious Docker images containing your brand or code references.
  • Ransomware File Detection – Locates files (e.g., contracts, customer data, internal reports) dumped by ransomware groups.
  • PII and Unverified Leaks – Detects early-stage leaks containing names, addresses, or identifiers tied to your organisation.
  • SEC Filings and Miscellaneous Files – Monitors exposure of sensitive documents, including regulatory filings or legal paperwork.

This is our most comprehensive offering, designed for clients who cannot afford blind spots. From ransomware group monitoring to leaked source code and botnet associations, the Enterprise Package delivers unmatched depth and clarity into your exposure risk.

Optional Add-ons

Enhance any of our packages with bespoke capabilities:

Additional asset coverage

Threat actor profiling

Domain takedown services

Integration with SIEM/SOAR platforms

Industry-specific intelligence feeds