This is an old revision of the document!
Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here https://kaduu.io. Please find below technical articles about our various features. If you have any questions, please contact support@kaduu.io.
In today's interconnected world, organizations are prime targets for cyberattacks, with phishing and malware attacks being among the most prevalent. Early detection is key, and our Threat Intelligence Product enables precisely that.\\
Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like 'www.bannkofexample.com'. At a quick glance, your customers or employees might not spot the difference, thus falling prey to the attacker's tactics.\\
That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes.\\
However, attackers can be crafty, often embedding your organization's name within a subdomain or a directory. For instance, they might use URLs like 'www.randomsite.com/yourbankname' or 'yourbankname.fakesite.org'. Such subtle incorporations are designed to exploit human oversight and amplify the attacker's success rate.
Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains.\\
Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL.
By amalgamating these varied sources of intelligence, our product provides you with comprehensive, real-time visibility into potential cyber threats.
PASSIVE DOMAIN RESEARCH IN EXPERT MODE
ACTIVE DOMAIN RESEARCH
SSL MONITORING
3RD PARTY PHISHING AND MALWARE REPORTS
SOCIAL MEDIA SPOOFING
MOBILE APP SPOOFING
DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES
EXPOSED INFRASTRUCTURE
EXPOSED EMPLOYEES
FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR DEEPWEB
DEEP WEB AND DARKNET MENTIONING
FIND OUT IF DATA HAS BEEN LEACKED
LEAK SEARCH IN EXPERT MODE
CREDIT CARD SEARCH IN EXPERT MODE
BOTNET SEARCH
RANSOMWARE MONITORING
COMPARE THE DATA
——–
ALERTS
ACCESS & EXPORT DATA
SETUP OPTIONS
GENERAL TOPICS