Darknet & Dark Web Research & Monitoring Services
Let CBIZ Pivot Point Security monitor the dark web (or darknet) for information related to your organization. We’ve helped organizations “discover information about a pending merger/ transaction that wasn’t public knowledge. Upon further research, it was discovered that an executive was backing his work files up on a home server that wasn’t secured” “For an energy company we found templates of their current payment statements circulating on a dark web”. We utilize the most comprehensive darknet data commercially available to perform research, monitoring and alerting of darknet data.
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user’s location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
Key Characteristics
- Anonymity: The dark web is known for providing a high level of anonymity to its users. This is primarily achieved through technologies such as Tor (The Onion Router) or I2P (Invisible Internet Project), which anonymize the user’s location and usage.
- Accessibility: Accessing the dark web typically requires specific software. The most common way to access it is through the Tor network using the Tor Browser. Unlike the surface web (the visible part of the internet indexed by search engines), dark web addresses often end in “.onion” and are not accessible through regular web browsers.
- Content: The dark web hosts a variety of content, much of which is legal but also includes a significant amount of illegal activities. Examples of dark web content include:
- Whistleblowing and journalism platforms
- Forums and marketplaces for illegal goods and services (e.g., drugs, weapons, stolen data)
- Private communication channels
- Security and Privacy: Due to its anonymous nature, the dark web is often used by individuals seeking privacy and security, such as political dissidents, journalists, and activists in repressive regimes. However, this same anonymity attracts illegal activities and illicit markets.
When considering your organizations risk of data leaks, you should ask yourself the following questions:
- Does your risk management group or IT Security teams monitor darknets for activity related to your organization?
- Have you had a breach and if so, do you know if company data has been published on Darknets?
- Do you know if your employees reuse passwords that have been published in other companies’ data breaches?
- Have your vendors or partners been breached exposing your company data?
HOW WE HELP
Investigate threat actors and improve threat intelligence!
- Search for bitcoin wallets and addresses
- Assess darknet brand exposure
- Identify threats on darknet forums
- Monitor for leaked credentials
- See inside authenticated chat rooms
- Track vendors on marketplaces
- Access historical darknet records
- Identify public IP addresses listed in the darknet
CBIZ Pivot Point Security can build a profile on your company to continuously monitor for darknet activity or we can perform one time research on your organization, customers and third-party suppliers.