User Tools

Site Tools


leak_search

LEAK Discovery

What is the threat?

Cyber criminals run daily attacks against organizations and their employees. In case of success, they try to commercialize the captured data. Often, they sell it to other hackers as leverage and/or in preparation for further attacks. If, for example, login credentials are stolen, they can be used to spread malware or gain access to further internal systems. The stolen data becomes a valuable product, and the hacker becomes a businessperson that trades that product – mainly in the Dark Web. As a result, millions of breached accounts, credit card and other data pop up almost daily in the Dark and Deep Web.

Login credentials and other breached data can be used to prepare targeted attacks against an organization. Even if the login data of an employee originates from a third party website, the threat is real and common because of password re-use, that is, employees often use the same or similar password to log into the organization’s applications. Often, breached data also contains a lot of valuable information about the target organization or its employees. This could help an attacker prepare spoofing or impersonation attacks.

How can Kaduu assist in mitigating this threat?

Monitoring whether your organization’s name appears in Dark Web forums, Onion-, I2P and paste sites can help you detect potential insider threats, enabling you to prevent data leaks and other incidents that may cause damage to your organization. Dark Web monitoring involves actively searching and tracking the Dark Web for information about your organization, including leaked or stolen data, compromised passwords, breached credentials, intellectual property, and other sensitive data. Please note: This functionality refers to a DB search. If you look for a Live Search, please consult this article.

How up to date is the data?

The database is updated daily from our analysts. We use different discovery methods (manual and automated).

What is a leak?

A data leak is when sensitive data within an organization is leaked to an external, unauthorized target, either accidentally or through a cyber attack or vulnerability. The data leak can be of physical or electronic information.

Unlike accounts, which always involve usernames and or passwords, a data leak can be, for example, an SQL database, a user's password, or even internal, confidential emails.

Where to find the leaks?

The leaks can be seen in the expert mode under the navigation item "list" (1). Every leak has some basic attributes like site, records or number of accounts included (2). If you want to see the details of the leak, you need to click on its name (3).

What details are provided within the leaks?

You will find basic metadata such as the date of discovery and publication (1). This is the date when the leak was discovered by our team. However, the data may have been stolen earlier. The leak may also include a website reference (2) if the leak originated from a hacked website.

The actual files within the leak can be downloaded when you click on "Files". Please note that only files less than 10 Mbyte are allowed to be downloaded:

The downloaded files will appear under "downloads" where you can open them:

Leak tags

Leak results often contain "Tags" assigned for the leak, which briefly show what information is contained within the leak. The system supports the following tags at the moment:

  1. Address: "Includes address details from individuals or organizations."
  2. Company: "Contains information specifically related to business or organizational addresses."
  3. Credit-Card: "Encompasses credit card data. Note: This applies to the overall leak, and specific search results may not always include credit card information."
  4. CSV: "The data in the leak is formatted as a CSV (Comma Separated Values) file."
  5. DOB: "Contains date of birth, contributing to personal information details."
  6. Email: "Includes one or more email addresses."
  7. Hash: "User passwords within the leak are encrypted or hashed."
  8. Identity: "Involves information that can be used to identify a person or entity, such as ID numbers or unique identifiers."
  9. IP: "Contains IP addresses within the leaked data."
  10. JSON: "The leak is formatted in JSON (JavaScript Object Notation)."
  11. Log: "Originates from stealer logs, typically containing a variety of extracted user data."
  12. Mix:A combo list combining various types of data, often usernames and passwords."
  13. Name: "Includes the names of individuals."
  14. Paper: "Contains scanned images of physical documents or papers."
  15. Password: "Features clear text passwords without encryption."
  16. Phone: "Contains one or more phone numbers."
  17. SQL: "Data is in the form of an SQL (Structured Query Language) dump."
  18. URL: "Includes web addresses or URLs."
  19. Username: "Contains usernames that may be associated with various accounts."
  20. Business: "The source of the leak is a business-related app, organization, or service."
  21. Private: "The source of the leak is from private use apps, organizations, or services."
  22. Account: "Includes account information, potentially across various platforms."
  23. Adult: "Associated with adult content or services."
  24. PII: "Contains Personally Identifiable Information, which can be used to identify an individual."
  25. Politics: "The source or content of the leak is associated with political entities or activities."

Leak search modus

Kaduu comes with two different search modus when manually searching for leaks (1). The standard modus (2) will allow you to search for a specific pattern. The results then will show where this search pattern appears (2a), what type of data it may contain (2b) and how many records it has (2c). If you want to see all the records, simply click on the number (2c).

When you use the extended search, you will directly see all records for your search term. Kaduu allows you to choose how many characters you can display before and after the exact match of your search term (1). The actual search term is always highlighted (2). The leak reference is displayed to the left (3). You can also sort the records with different sort filters (4).

Leak exports options

In order to export the leak data, you first need to select the records you want to export (1) and then click on (2) export and select the according format (JSON, CSV, DOCX, HTML):

Leak alerting options

Based on specific search results you are able to create alerts. Please click "create alerts" in the navigation menu (1) and select the alert type:

Target Upload

Opposite to a single target within the search field, you can also upload a list of targets (1) using the upload button. Please use one entry per line (2). The results will then be displayed to the left:

Leak search tips

When you look for the word "examples", you will find +100 K records containing that word. If you look for "examples.com" you will see much less records. A search term that contains a domain like "examples.com" will on the other hand result in many more account records. But you might be missing out leaks that do not contain domains. Therefore it is important to play with the search terms and try only the company name without the domain. If the company name is very generic, you might end up with too many false positives. In such a case you can use the search tools explained in the next chapter.

So what is the best search strategy? The answer is: it doesn't exist. Every customer has different domain names or brands. If a customer uses a very generic word or a very short word, the number of search results will be enormous. In such a case, you have to approach it slowly with targeted manual queries. Therefore, each customer should first be individually examined manually by an analyst before creating automated alerts.

Leak search options

Kaduu offers many search options.

Field Details
createdAt Creation date & time.
content Leak content (default field).
leakId Leak ID
fileName Leak file name (fileName:yourfile.txt)
fileExtension Leak file extension (fileExtension:sql)

Detailed Search Syntax:

Field Details
test Search documents containing test as a separate word or as a part of other word (delimited by punctuation characters).The following will match: test@gmail.com, test.love@mail.com, god_test@nice.org, "this is a test data", hey@test.org, bye@test-data.org
test.com Search documents containing test.com as a separate word or as a part of other word (delimited by punctuation characters). The following will match: boss@test.com, hr@this-is-test.com, test.com, data.test.com, super-test.com.
john@test.com Search documents containing john@test.com email. The search will only match that exact email and nothing else.
@test.com Search documents containing emails on test.com domain.
test AND leakId:158dd4b2-7672-3492-95f6-019479cb4552 Search documents containing test, in leak with ID 158dd4b2-7672-3492-95f6-019479cb4552.
microsoft AND fileExtension:sql AND createdAt:[2020-01-01 TO *] Search documents containing microsoft in files with sql extension in leaks that were indexed after January 1st, 2020.
"bank hack"~5 Search documents using a fuzzy search. The matching document should contain bank word, followed by hack word within 5 words distance.
quick brown Search for quick or brown in leak text. This is the equivalent of quick OR brown search query.
quick OR brown Search for quick or brown in text. OR keyword is case-sensitive. This is the equivalent of quick brown search query.
quick AND brown Search for quick and brown - the document should have both. AND keyword is case-sensitive.
quick AND NOT brown Search for documents with quick and not brown. AND and NOT keywords are case-sensitive.
quick -brown Search for documents, with quick and no brown. This is the equivalent of quick AND NOT brown query.
createdAt:2020-03-05 Search for documents created on 5th of March, 2020.
createdAt:[2019-01-01 TO 2020-01-01] Search for leaks created between January 2019 January 2020
createdAt:[* TO 2020-01-01] Search for leaks created until 1st of January, 2020.

Leak Dates

Definition

Each leak or entry in Kaduu has multiple associated dates, which help to understand its timeline and relevance. Here’s an example:

Leak XXX; Publish Date: 2021-08-18; Discover Date: 2021-10-20; Creation Time: 2022-02-04 10:45:30

  • Publish Date: This is the estimated date when the leak occurred or possibly first appeared on the darknet. It signifies the initial exposure of the information, often marking the beginning of its journey through the dark web.
  • Discover Date: This is when our CTI solution first identified the leak. At this point, our analysts or automated tools detected the breach during routine scans of dark web marketplaces, forums, and private channels.
  • Creation Date: This is when the leak was officially indexed in our database. Once a breach is verified, tagged, and cataloged by our system, it becomes accessible for further analysis.

Are Old Leaks Still Valid?

In assessing the relevance of a leak, it’s essential to distinguish between paid and free leaks. Hackers typically attempt to monetize data by offering it for sale on specialized forums. If the data doesn’t sell, the price often decreases over time, eventually becoming available for free a few months post-breach. As a result, there can be a time gap of up to six months between when a leak is first offered for sale and when it appears in the free leaks section of Kaduu.

For real-time alerts on data that is still actively being sold, Kaduu provides a live hacker forum query feature. Learn more here.

Do Leaks Retain Their Exploitability Over Time?

Surprisingly, even older leaks can retain a 5% success rate for credential validity. This might seem small, but with thousands or even millions of credentials in each leak, this percentage can result in a significant number of active accounts. Given the sheer volume of credentials released daily, it’s impractical for attackers to exploit them all in real time. Hackers usually focus on data that is easy to monetize, such as access to streaming platforms or shopping sites, rather than corporate applications like SAP or webmail.

Another crucial point is password patterns. Many users follow predictable patterns, such as "PaSSw0rd2024June," which means an expired password may still be relevant, as similar credentials can be anticipated for future periods (e.g., July). Additionally, breached credentials may highlight corporate policy violations—like a company email being used on personal websites (e.g., dating sites), signaling a need for awareness training.

Reasons for Discrepancies Between Publish and Creation Dates

Different dates associated with a leak can often reflect varying stages of its lifecycle, from initial breach to public disclosure. Here’s why discrepancies may occur:

  • Short Delays (1-2 Days): The discovery and indexing of leaks involve a series of manual steps. Our team of analysts actively monitors hundreds of dark web channels and groups daily, manually downloading and inspecting leak files. Some links may be temporarily unavailable, forums may experience downtime, or files may need verification. After inspection, the files are tagged, labeled, and added sequentially to our database, creating a standard delay of around 10-12 hours due to the manual process. While this time gap exists, leaks published for free tend to remain available for months, minimizing immediate exploitation risks. For clients requiring real-time monitoring, daily or live monitoring of for-sale leaks is recommended over free leak tracking.
  • Extended Delays (Weeks or Months): Sometimes, the publish date reflects the actual date of the breach, while the data itself may not be immediately available. Hackers often exploit the data for their own purposes before releasing it publicly. For example, a hacker might use the data for fraudulent transactions or identity theft before attempting to monetize it. In cases like these, the press may report a security breach early on, but the data might not appear on dark web forums until a year later. To help clients understand the full context, we always include the publish date to reflect the initial breach timing.

Leak Result Duplicates

In Kaduu, users might notice that some leaks are reported multiple times. This duplication can occur due to various factors, including the way data is handled by hackers and the inherent challenges of processing leaked information. Below is an explanation of why such duplicates appear and how they are managed:

Reasons for Duplicate Leak Results

Repacking of Data (Combolists)

Many hackers repurpose existing leaks by combining them into new data archives, often referred to as combolists. These are collections of login credentials repackaged for distribution. In the past most famous combolists had names Like "collection I" or "collection II". In this case a cyber security analyst was collecting all leaks and saved them in one large archive called "collection" which was a so called combo list.

To maintain database integrity, the Kaduu team ensures that combolists with a similarity index of 100% are excluded. A similarity index of 100% means that all the data in the leak already exists in Kaduu's database. However, combolists with a lower similarity index, such as 90%, are retained. This is because such leaks may still contain new and relevant data. Unfortunately, it is not possible to filter out the 90% overlaps programmatically.

Reuse of Credentials Across Platforms

Sometimes, the same credentials appear in multiple leaks because users often reuse their login information across different platforms or websites.

For example, the same username and password might be discovered on various servers, indicating poor security practices.

This is considered significant because it provides insights into a user's vulnerability across platforms.

Inconsistent Formatting of Data

Leaks often vary in their formatting and syntax, which can make it challenging to identify duplicate information. For example:One leak might present credentials as https://website.com:username:password, while another might use the format username:pwd:website.com.

Due to the differing order of elements, these entries are treated as distinct in Kaduu's system, even though they represent the same credentials.

This discrepancy is a technical limitation that prevents automated detection of duplicates.

Planned Improvements by Kaduu

To address these challenges, Kaduu is enhancing its capabilities through the upcoming platform darknetsearch.com. The following measures are planned:

Duplicate Filtering in Alerts

The new platform will include features to filter duplicate entries in alerts. This will help clients manage the redundancy in leak reports more effectively.

Optional Duplicate Visibility

Since some clients find value in tracking where a user’s credentials appear (e.g., in which forums or combolists), the duplicate filtering feature will not be activated by default. This allows users to choose whether they want to view all instances of a user's credentials or only unique occurrences.

Asterisks in leak details

When our team issues an account to access the application, we ususable enable full content output for the user, unless we are asked not to show password details etc. But when you create yourself users in the system, the default setting is "asterisks - hide content". As a result you will only see partial data and most of the sensitive data is hidden behind symbols like "*". If you want this to be changed for the users, please contact info@kaduu.ch with the information of your client name and user name. We will change that within 24 h in the backend for you.

API Script to extract accounts from leaks

Many stealer logs do not get processed correctly in the account search and you might see partial or no passwords. In such a case you can use this API script to query the leak endpoint:

  • Use the DateRange.txt file to define the date range for your query
  • auth.txt contains your Kaduu login
  • input.txt contains the domain you want to query. Do not use a subdomain like www in your query.
  • tags: The script filters for leaks that have the tag account. You can add more tags if reuquired
leak_search.txt · Last modified: 2024/11/20 14:42 by kaduuwikiadmin