A Dark Web Story

by | Oct 30, 2018 | Uncategorized

I have written about the Dark Web in the past, and nothing has changed, but I did want to share a real life story. Now that we have access to the Dark Web to run reports on client data breaches, we have seen interesting results. Only once did the report come back clean with no data. This seems to be super rare since pretty much everyone has some form of data on the Dark Web. 

Recently we ran a report for a client and it showed a list of logins and passwords that were found on the Dark Web. Many of them were real logins for their employees which is never a good thing. What made this report different from other clients’ is that one of the results showed that the login was leaked due to a keylogger running (this is a rogue app that captures your key strokes and sends them to the bad guys – in this case they captured the username and password for an application). Once the infected user with the security risk was known, the rogue app could be removed. The next question to ask was, how did they get infected? Turns out, the infection was caused by an internal web application that was hacked and silently infecting everyone. Yikes. Ultimately, everything was able to be cleaned up, but without the report from the Dark Web showing the details of the data breach, the client would have not known about any of it. Double Yikes.

Several of our clients have chosen to have their data monitored in real-time so they can catch any kind of Dark Web breach quickly. It is pretty inexpensive so I tell them to think of it like insurance: you hope you do not get a lot of activity, but when you do, you can react accordingly and minimize the risk quickly. 

Got a question or a comment? Don’t hesitate to contact anyone on the Waident team!

 

 

 

 

John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.

Subscribe


Related posts

Interesting Tech

Interesting Tech

                      Hushme - A muzzle you wear for those important office calls that you do not want to be overheard. Or give one to that loud guy you work with to wear… KittyKorner – Turn almost any interior door into one with a cat door. The Edge Desk – Ever...

Security – Just Deal With It Already!

Security – Just Deal With It Already!

There are way too many stories about companies that discover a security breach and then find out that the actual breach happened months or even years ago. Yikes. No one ever wants to be in that position so why not try to avoid it? Krebs on Security wrote a good...

Take the Time to Turn on a Credit Freeze

Take the Time to Turn on a Credit Freeze

The sad reality is that no one cares about your data so you need to. With the recent Equifax security breach, more than half of the adults in the US had all of  their personal information leaked. It is inconceivable that something like this could happen. Even worse,...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This