Skip to content

Dark Web Overview

The Dark Web module monitors underground forums, marketplaces, stealer log repositories, Telegram channels, and breach dumps for mentions of your organization. It surfaces compromised credentials, data breaches, threat actor discussions, and payment card leaks -- giving your security team early warning of threats that originate outside your perimeter.

Overview

Dark Web Overview

Hero Metrics

The top of the dashboard displays four summary cards:

MetricWhat It Measures
Compromised UsersTotal count of employee credentials found across stealer logs and breach data
Impacted DomainsNumber of your domains and subdomains that appear in dark web findings
Dark Web MentionsTotal mentions of your organization across forums, Telegram, and other channels
Executives at RiskCount of executive-level personnel whose data appears in dark web sources

Dashboard Sections

Trend Charts

Two side-by-side bar charts show monthly volumes with year-over-year navigation:

  • Dark Web Conversations -- Monthly count of forum posts and Telegram messages mentioning your organization. A spike may indicate a coordinated campaign or new interest from threat actors.
  • Compromised Users -- Monthly count of new stealer log credentials discovered. Rising trends suggest ongoing infections within your employee base.

Most Impacted Domains & Subdomains

A multi-column breakdown showing which of your domains and subdomains appear most frequently in dark web data, organized by module (Stealer Logs, Data Breaches, Discussions, etc.). Toggle between All Domains and Priority to focus on high-value assets.

Most Impacted Users

Shows the employees whose credentials appear most frequently across dark web sources, broken out by module. High counts for a single user may indicate persistent device compromise.

Most Impacted Executives

Same format as impacted users, but filtered to executives configured in your organization's executive monitoring settings.

Activity Feed

A sidebar feed shows recent dark web findings in chronological order with severity indicators and source attribution.

Date Range Filter

Use the dropdown in the page header to adjust the time window: Today, Last 7 Days, Last 30 Days (default), or This Year.

Data Sources

ShadowMap collects dark web intelligence from:

  • Underground forums and marketplaces -- Hacking forums, carding shops, and access brokers
  • Data breach dumps and paste sites -- Public and private dump repositories
  • Stealer log repositories -- Redline, Raccoon, Vidar, Lumma, and other info-stealer output
  • Telegram channels and groups -- Threat actor communication channels
  • Onion sites and hidden services -- Tor-based marketplaces and leak sites

Modules

ModuleDescription
Data BreachesYour organization's data found in dark web breach dumps
Compromised UsersEmployee credentials harvested by info-stealer malware
DiscussionsDark web forum posts mentioning your organization
Compromised ComputersCorporate machines identified in stealer log data
Telegram ConversationsThreat actor communications on Telegram mentioning your brand
Credit Card LeaksPayment card data associated with your organization

ShadowMap by Security Brigade