The Dark Web is often thought of as a place for illegal activities – from drug dealing to human trafficking. That, sadly, is the case. However, it’s also a playground for cybercriminals. If you’ve suffered a security breach or cyberattack, evidence might be found there.
What is the Dark Web?
The Dark Web is a hidden universe, used for largely criminal activity, that’s contained within the ‘Deep Web’ – a sublayer of the Internet.
You can’t find the Dark Web unless you’re really looking for it, as it can’t be accessed through mainstream search engines and without specific tools. That being said, it’s not small – in fact, it’s over 500 times the size of the indexed ‘surface’ internet that you can access through Google, Bing, etc.
Why should I be concerned about it?
The Dark Web holds a vast amount of data and personal information stolen in cyberattacks. One of the many criminal activities it’s used for is as a marketplace for selling stolen data.
Email addresses, usernames and passwords, that have been obtained in cyberattacks, are sold to criminals that will use them to gain access to critical business applications, as well as online services. And, because most people reuse the same passwords across multiple accounts, it only takes a single breach for cybercriminals to potentially access all of a user’s other online accounts. You can read more about password management in our recent news story “Why you should be using a password manager”.
If your user credentials are stolen and then sold on the Dark Web, it would allow criminals to infiltrate your company network to steal data and sensitive corporate information and conduct other malicious activities.
What is Dark Web Monitoring?
Dark Web Monitoring is one of the ways in which you can fight back. With this type of Monitoring, you can keep an eye out for evidence of sensitive data relating to you and your employees having been stolen and made available for purchase on it.
This service continuously searches, monitors and reports on the existence of your organisation’s email credentials on the Dark Web. It does this by connecting to a variety of Dark Web services through which evidence of compromised credentials can be found, without the involvement of any of your IT infrastructure.
It will scour botnets, criminal and black market sites, repositories, peer-to-peer networks, forums, private networks, bulletin boards, chat rooms, malicious websites, blogs and social media sites based in the Deep/Dark Web. And, if stolen data is detected, you can take emergency steps to reduce potential damage.
How would I benefit?
Firstly, without Dark Web Monitoring, you have far less visibility of when your credentials are stolen. Over 75% of compromised credentials are reported to victims by third parties, by which it may well be too late.
With Dark Web Monitoring, you can take a proactive approach to prevent data breaches and neutralise the damage a breach can make.
How can Microtrading help?
We offer our own Dark Web ID monitoring service to detect and mitigate cyber threats that use stolen email addresses and passwords. We combine human and artificial threat intelligence to continuously monitor the web on your behalf in real time – day and night, all year round.
We leave no stone unturned in looking for signs of compromised details pertaining to your organisation – to keep you better protected. We’ll identify any exposed and compromised credentials that relate to your organisation’s email addresses and alert you immediately, as well as advising you on the steps required to mitigate risk.