Skip to content

Leaked Files

ShadowMap detects sensitive files belonging to your organization that have been exposed on malware analysis platforms, public file-sharing services, and other public sources. This module identifies documents, database exports, configuration files, and other sensitive files that may contain proprietary or confidential data.

Overview

Leaked Files

The listing page displays leaked files in a structured table with sortable columns. Results support bulk selection for batch operations, and a detail modal provides full metadata for each file. The view is organized by file status tabs (All/Needs Review, Accepted, Takedown Requested, Takedown Completed, Reviewed).

Understanding the Data

ColumnDescription
File NameName of the leaked file. Clicking the row opens the file's source URL in a new tab.
HashThe file's cryptographic hash (SHA-256 or MD5), used to uniquely identify the file across sources
TypeThe file format/extension: CSV, JSON, XML, SQL, TXT, PEM/KEY, ENV, config, and others
EnvironmentThe detected analysis environment where the file was processed (e.g., quickscan, full sandbox)
Threat LevelThe malware analysis verdict for the file
DateWhen the file was first detected, shown as relative time

Detail View Modal

Clicking View Details on any file opens a modal showing the complete metadata:

  • File name and Hash
  • Summary of the file's contents
  • Threat Level and Environment
  • Type (file format)
  • Sample link (direct URL to the file on its source platform)
  • Timestamp of detection

File Types

ShadowMap categorizes leaked files by type. Common types include:

TypeWhat It Typically Contains
CSVDatabase exports, customer lists, financial data, employee records
JSONAPI responses, configuration data, application state dumps
XMLApplication configurations, data interchange files, SOAP responses
SQLDatabase dumps, schema definitions, stored procedures with embedded credentials
TXTLog files, credential lists, configuration notes
PEM/KEYSSL/TLS certificates, private keys, SSH keys
ENVEnvironment variable files containing API keys, database credentials, and service URLs
ConfigApplication configuration files (nginx.conf, apache.conf, php.ini, etc.)

Threat Levels

The threat level reflects the malware analysis platform's verdict on the file:

Threat LevelBadge ColorMeaning
MaliciousRedThe file was flagged as malicious -- it may contain malware or was submitted alongside malware
SuspiciousYellow/WarningThe file exhibits suspicious characteristics but no definitive malware verdict
AmbiguousYellow/WarningThe analysis was inconclusive
No Specific ThreatGreenThe file is not malicious, but it may still contain sensitive organizational data
No VerdictGreenNo malware analysis verdict is available
Not Available / UnknownGrayThe file was not processed by the analysis platform

Note: Even files with "No Specific Threat" require attention -- the concern is not malware but data exposure. A non-malicious CSV file containing customer records is still a critical finding.

Critical File Types That Affect Security Rating

Certain file types carry heavier Security Rating penalties due to the severity of what they typically expose:

  • PEM/KEY files -- Private keys enable impersonation, man-in-the-middle attacks, and decryption of encrypted traffic
  • ENV files -- Environment files typically contain complete credential sets for production systems
  • SQL dumps -- Database exports may contain entire customer databases, including PII
  • Config files -- Server configurations expose internal architecture, service endpoints, and sometimes embedded credentials

Available Actions

Individual Actions

ActionDescription
Mark as ReviewedMove the finding to the Reviewed (false positive) list
Mark as OnlineRestore a reviewed finding back to active status
Mark as AcceptedAcknowledge the finding without marking it as false positive
Remove from AcceptedReverse the accepted status
Request TakedownSubmit a takedown request to remove the file from its source
View DetailsOpen the full detail modal
CommentAdd internal notes using free-text or templates
Share via IntegrationPush to connected tools (ServiceNow, Jira, etc.)

Bulk Actions

Select multiple files using checkboxes to:

  • Bulk Mark as Reviewed -- Dismiss multiple false positives at once
  • Bulk Mark as Online -- Restore multiple reviewed items
  • Bulk Share via integrations

The dynamic filter panel supports:

  • Filename -- Search by file name
  • Type -- Filter by file format (CSV, JSON, SQL, etc.)
  • Environment -- Filter by analysis environment
  • Threat Level -- Filter by malware analysis verdict
  • Timestamp -- Filter by detection date

Response Guidance

  1. Assess the contents. Before taking action, understand what data the file contains. A leaked ENV file with production database credentials is an emergency; a leaked public marketing PDF is not.
  2. Rotate all credentials found in leaked configuration files, ENV files, and SQL dumps. Assume anything in the file is compromised.
  3. Determine the source. How did this file end up on a malware analysis platform? Common paths include: an employee uploaded it for scanning, malware on an employee's device exfiltrated it, or a third-party vendor exposed it.
  4. Request takedown for files containing sensitive data. While the file may already have been downloaded by others, removing it from public platforms limits further exposure.
  5. Check for related files. If one file was leaked, others from the same source may also be exposed. Search for the same hash, similar file names, or the same upload timeframe.
  6. Review endpoint security. If the file reached a malware analysis platform through an infected endpoint, investigate the device for active malware infections.

ShadowMap by Security Brigade