This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
leak_search [2024/04/24 17:11] kaduuwikiadmin [API Skript to extract accounts from leaks] |
leak_search [2025/03/06 13:48] (current) kaduuwikiadmin [How up to date is the data?] |
||
---|---|---|---|
Line 11: | Line 11: | ||
Monitoring whether your organization’s name appears in Dark Web forums, Onion-, I2P and paste sites can help you detect potential insider threats, enabling you to prevent data leaks and other incidents that may cause damage to your organization. Dark Web monitoring involves actively searching and tracking the Dark Web for information about your organization, | Monitoring whether your organization’s name appears in Dark Web forums, Onion-, I2P and paste sites can help you detect potential insider threats, enabling you to prevent data leaks and other incidents that may cause damage to your organization. Dark Web monitoring involves actively searching and tracking the Dark Web for information about your organization, | ||
- | ==== How up to date is the data? ==== | + | ==== How do we find the leaks? ==== |
+ | |||
+ | Our team of full-time analysts conducts daily monitoring of various platforms, including hacker forums on the surface web, darknet, and Telegram channels. Each analyst is assigned a clearly defined area of focus, ensuring comprehensive coverage across different sources. | ||
+ | |||
+ | When we discover a data breach being offered for free, we promptly download and thoroughly investigate it. For breaches listed for sale, we acquire sample data whenever possible to notify our clients if their sensitive information might be at risk of exposure. | ||
+ | |||
+ | All collected information that could hold value for our clients is meticulously indexed. This includes a variety of formats, such as database files (e.g., SQL dumps), physical documents (e.g., Word, Excel, PDF), or text-based leak data (e.g., CSV or TXT files). Each breach undergoes a strict internal verification process by our team to confirm its authenticity and relevance. | ||
+ | |||
+ | Once verified, we enrich the data with metadata to provide essential context. Metadata includes details such as the source of the leak, the date of the breach, the type of data involved, and other relevant information. After this process, the verified and indexed data is uploaded to our system, making it searchable and accessible to all clients for further investigation. | ||
+ | |||
+ | **Key Explanations for Potentially Unclear Terms:** | ||
+ | * Surface web: The publicly accessible portion of the internet that standard search engines like Google can index. | ||
+ | * Darknet: A part of the internet that requires specific software (e.g., Tor) to access. It's often associated with anonymity and illegal activities but is also used for privacy purposes. | ||
+ | * Telegram channels: Groups or channels on the Telegram messaging platform, commonly used for communication and sharing information, | ||
+ | * SQL dumps: Copies of entire databases, often leaked during breaches. | ||
+ | * CSV/TXT files: Common formats for storing text data, typically containing structured information like lists, logs, or tables. | ||
+ | * Metadata: Additional information about a file or data set that helps to describe, organize, and manage the data more effectively (e.g., time, location, type). | ||
+ | |||
+ | ==== How up to date and accurate | ||
+ | |||
+ | Our credential database is updated daily by a dedicated team of analysts who actively monitor and extract data from hacker forums, Telegram channels, and various darknet sources. The credentials available in our database search are those that have already been publicly leaked—often because hackers failed to sell them and instead chose to distribute them for free. | ||
+ | |||
+ | If you are searching for newer, actively traded credentials, | ||
+ | |||
+ | **Data Accuracy and Duplicate Entries** | ||
+ | |||
+ | Credential leaks often get repackaged and redistributed in collections and archives, leading to duplicate entries. While our system works to filter out redundancies, | ||
+ | |||
+ | Furthermore, | ||
+ | |||
+ | * Users change their passwords after a breach is exposed. | ||
+ | * Accounts may be deleted or suspended by the service provider. | ||
+ | * Credentials become obsolete as new security measures are implemented. | ||
+ | |||
+ | The older the dataset, the higher the probability that the credentials are no longer functional. Since these credentials are publicly available, they are accessible to anyone, diminishing their immediate value to attackers. | ||
+ | |||
+ | **Why Monitoring is More Important than Retrospective Analysis** | ||
+ | |||
+ | Rather than relying solely on static historical reports, continuous monitoring of leaked credentials is essential. A one-time report over an extended period is not as effective as ongoing surveillance because: | ||
+ | Even if 99% of leaked credentials are outdated, the remaining 1% of active credentials still pose a security risk. | ||
+ | |||
+ | Leaked credentials provide critical intelligence beyond just direct access, such as: | ||
+ | |||
+ | * Employee usage of third-party services with company accounts (e.g., logging into Netflix or other non-business platforms using corporate credentials). | ||
+ | * Password patterns that reveal predictable behavior. For example, if a user previously used Summer2024, there' | ||
+ | * Cross-service password reuse, which allows attackers to map out vulnerabilities across multiple platforms. | ||
+ | * Exposure assessment, measuring how frequently an employee' | ||
- | The database is updated daily from our analysts. We use different [[how_do_we_find_the_data_in_kaduu|discovery methods]] (manual and automated). | ||
===== What is a leak? ===== | ===== What is a leak? ===== | ||
Line 28: | Line 73: | ||
- | ===== What details are provided within the leaks? | + | ===== Leak Details and Downloads |
You will find basic metadata such as the date of discovery and publication (1). This is the date when the leak was discovered by our team. However, the data may have been stolen earlier. The leak may also include a website reference (2) if the leak originated from a hacked website. | You will find basic metadata such as the date of discovery and publication (1). This is the date when the leak was discovered by our team. However, the data may have been stolen earlier. The leak may also include a website reference (2) if the leak originated from a hacked website. | ||
Line 41: | Line 86: | ||
{{:: | {{:: | ||
+ | |||
+ | If you want to investigate the details of the leak, but cant download the file because of the size restrictions, | ||
+ | |||
+ | {{:: | ||
+ | |||
+ | Then you can use that ID to search for the content you are intersted in (sample query " | ||
+ | |||
+ | {{:: | ||
+ | |||
+ | |||
+ | If you want to see all the data in a leak, you can also just query the ID itself like " | ||
Line 47: | Line 103: | ||
Leak results often contain " | Leak results often contain " | ||
- | | + | - Address: " |
- | | + | - Company: " |
- | | + | - Credit-Card: " |
- | * credit-card | + | - CSV: "The data in the leak is formatted as a CSV (Comma Separated Values) file." |
- | | + | - DOB: " |
- | | + | - Email: " |
- | | + | - Hash: " |
- | | + | - Identity: " |
- | | + | - IP: " |
- | | + | - JSON: "The leak is formatted in JSON (JavaScript Object Notation)." |
- | | + | - Log: " |
- | | + | - Mix:A combo list combining various types of data, often usernames and passwords." |
- | | + | - Name: " |
- | | + | - Paper: " |
- | | + | - Password: " |
- | | + | - Phone: " |
- | | + | - SQL: "Data is in the form of an SQL (Structured Query Language) |
- | | + | - URL: " |
- | | + | - Username: " |
- | | + | - Business: "The source of the leak is a business-related app, organization, |
+ | - Private: "The source of the leak is from private use apps, organizations, | ||
+ | - Account: " | ||
+ | - Adult: " | ||
+ | - PII: " | ||
+ | - Politics: "The source or content of the leak is associated with political entities or activities." | ||
Line 106: | Line 167: | ||
So what is the best search strategy? The answer is: it doesn' | So what is the best search strategy? The answer is: it doesn' | ||
- | |||
- | |||
Line 144: | Line 203: | ||
===== Leak Dates ===== | ===== Leak Dates ===== | ||
- | Every leak or entry in kaduu has different | + | === Definition === |
+ | |||
+ | Each leak or entry in Kaduu has multiple associated | ||
+ | |||
+ | Leak XXX; Publish Date: 2021-08-18; Discover Date: 2021-10-20; Creation Time: 2022-02-04 10:45:30 | ||
+ | |||
+ | * Publish Date: This is the estimated date when the leak occurred or possibly first appeared on the darknet. It signifies the initial exposure of the information, | ||
+ | * Discover Date: This is when our CTI solution first identified the leak. At this point, our analysts or automated tools detected the breach during routine scans of dark web marketplaces, | ||
+ | * Creation Date: This is when the leak was officially indexed in our database. Once a breach is verified, tagged, and cataloged by our system, it becomes accessible for further analysis. | ||
+ | |||
+ | === Are Old Leaks Still Valid? === | ||
+ | |||
+ | In assessing the relevance of a leak, it’s essential to distinguish between paid and free leaks. Hackers typically attempt to monetize data by offering it for sale on specialized forums. If the data doesn’t sell, the price often decreases over time, eventually becoming available for free a few months post-breach. As a result, there can be a time gap of up to six months between when a leak is first offered for sale and when it appears in the free leaks section of Kaduu. | ||
+ | |||
+ | For real-time alerts on data that is still actively being sold, Kaduu provides a live hacker forum query feature. Learn more here. | ||
+ | |||
+ | === Do Leaks Retain Their Exploitability Over Time? === | ||
+ | |||
+ | Surprisingly, | ||
+ | |||
+ | Another crucial point is password patterns. Many users follow predictable patterns, such as " | ||
+ | |||
+ | === Reasons for Discrepancies Between Publish and Creation Dates === | ||
+ | |||
+ | Different dates associated with a leak can often reflect varying stages of its lifecycle, from initial breach to public disclosure. Here’s why discrepancies may occur: | ||
+ | |||
+ | * Short Delays (1-2 Days): The discovery and indexing of leaks involve a series of manual steps. Our team of analysts actively monitors hundreds of dark web channels and groups daily, manually downloading and inspecting leak files. Some links may be temporarily unavailable, | ||
+ | |||
+ | * Extended Delays (Weeks or Months): Sometimes, the publish date reflects the actual date of the breach, while the data itself may not be immediately available. Hackers often exploit the data for their own purposes before releasing it publicly. For example, a hacker might use the data for fraudulent transactions or identity theft before attempting to monetize it. In cases like these, the press may report a security breach early on, but the data might not appear on dark web forums until a year later. To help clients understand the full context, we always include the publish date to reflect the initial breach timing. | ||
+ | |||
+ | |||
+ | ===== Leak Result Duplicates ===== | ||
+ | |||
+ | In Kaduu, users might notice that some leaks are reported multiple times. This duplication can occur due to various factors, including the way data is handled by hackers and the inherent challenges of processing leaked information. Below is an explanation of why such duplicates appear and how they are managed: | ||
+ | |||
+ | ==== Reasons for Duplicate Leak Results ==== | ||
+ | |||
+ | === Repacking of Data (Combolists) === | ||
+ | |||
+ | Many hackers repurpose existing leaks by combining them into new data archives, often referred to as combolists. These are collections of login credentials repackaged for distribution. In the past most famous combolists had names Like " | ||
+ | |||
+ | To maintain database integrity, the Kaduu team ensures that combolists with a similarity index of 100% are excluded. A similarity index of 100% means that all the data in the leak already exists in Kaduu' | ||
+ | However, combolists with a lower similarity index, such as 90%, are retained. This is because such leaks may still contain new and relevant data. Unfortunately, | ||
+ | |||
+ | === Reuse of Credentials Across Platforms === | ||
+ | |||
+ | Sometimes, the same credentials appear in multiple leaks because users often reuse their login information across different platforms or websites. | ||
+ | |||
+ | For example, the same username and password might be discovered on various servers, indicating poor security practices. | ||
+ | |||
+ | This is considered significant because it provides insights into a user's vulnerability across platforms. | ||
+ | |||
+ | === Inconsistent Formatting of Data === | ||
+ | |||
+ | Leaks often vary in their formatting and syntax, which can make it challenging to identify duplicate information. For example:One leak might present credentials as https:// | ||
+ | |||
+ | Due to the differing order of elements, these entries are treated as distinct in Kaduu' | ||
+ | |||
+ | This discrepancy is a technical limitation that prevents automated detection of duplicates. | ||
+ | |||
+ | ==== Planned Improvements by Kaduu ==== | ||
+ | |||
+ | To address these challenges, Kaduu is enhancing its capabilities through the upcoming platform darknetsearch.com. The following measures are planned: | ||
- | Publish Date 2021-08-18 | + | ==== Duplicate Filtering in Alerts ==== |
- | Discover Date 2021-10-20 | + | |
- | Creation Time 2022-02-04 10:45:30 | + | |
+ | The new platform will include features to filter duplicate entries in alerts. This will help clients manage the redundancy in leak reports more effectively. | ||
- | The publish date is when we think the leak happened. The Discover date is when we discovered the leak. The creation date is when the leak was indexed in our DB. Thats why you should only filter by publish date to associate the leak with the correct date! | + | ==== Optional Duplicate Visibility ==== |
+ | Since some clients find value in tracking where a user’s credentials appear (e.g., in which forums or combolists), | ||
+ | This allows users to choose whether they want to view all instances of a user's credentials or only unique occurrences. | ||
===== Asterisks in leak details ===== | ===== Asterisks in leak details ===== |