Skip to content

Data Breaches

ShadowMap monitors dark web sources for data breach dumps that contain information associated with your organization. When a third-party service is breached, employee or customer credentials may appear in dumps shared on forums, marketplaces, and paste sites. This view tracks all known breaches affecting your organization so you can respond before attackers exploit the exposed data.

Overview

Data Breaches

View Modes

The page supports two view modes, toggled via the header:

  • Table View -- Traditional sortable table with columns for bulk triage. Best for processing large volumes.
  • Timeline View -- Chronological visualization of breaches showing when each breach occurred and was discovered. Best for identifying patterns and reporting.

Understanding the Data

ColumnDescription
Breach DateWhen the breach originally occurred at the third-party service
RiskSeverity rating based on data types exposed and credential freshness
TitleName of the data breach or the breached service
Breach ValueThe exposed credential or data point (email, username) belonging to your organization
PasswordWhether a password was included in the breach data (plaintext, hashed, or not available)
First SeenWhen ShadowMap first detected this data in dark web sources
TakedownTakedown request status (if applicable)
ActionCurrent workflow status (Needs Action, Action Taken, False Positive)

Filters

  • Full-text search -- Search by breach name, email, domain, or other keywords
  • Category filters -- Filter by risk level, source, data type, or date range
  • Export -- Download filtered results in Excel format

How This Differs from Stealer Logs

FactorData BreachStealer Log
SourceThird-party service was breachedUser's device was infected with malware
ScopeOne breached service per entryEvery service the user accessed
Password stateOften hashed or saltedAlways plaintext
FreshnessCan be months or years oldDays to weeks old
Session cookiesNot includedIncluded -- can bypass MFA
Device contextNo machine infoFull machine fingerprint

Data breaches are important but generally lower urgency than stealer logs. Breached passwords may already be rotated, while stealer log credentials are typically recent and plaintext.

When New Breach Data Appears

  1. Identify affected users -- Cross-reference breached emails with your employee directory and SSO provider
  2. Force password resets -- Require password changes for all affected accounts, prioritizing accounts where the breach includes plaintext or weakly-hashed passwords
  3. Enable MFA -- If not already enforced, enable multi-factor authentication on all critical systems. Breach data makes credential stuffing trivial.
  4. Monitor for credential stuffing -- Check authentication logs for login attempts from unusual IPs or geolocations targeting affected accounts
  5. Notify affected individuals -- Follow your incident response plan and regulatory requirements (GDPR, state breach notification laws)

Ongoing Hygiene

  • Set up SLA Policies to enforce response timeframes for new breach findings
  • Review breach data regularly to identify employees who appear in multiple breaches (indicating password reuse)
  • Use breach data to justify security awareness training focused on password hygiene and password manager adoption

ShadowMap by Security Brigade