dfi.kaspersky.com Open in urlscan Pro
93.159.228.40  Public Scan

Submitted URL: https://ml.kaspersky.com/ODAyLUlKTi0yNDAAAAGTFTKTCaz_ZLdwqtM1nNNGxEhk_7kkjZ9TevcLYA3-eaOrAKhwGpGEeJbGfe3jlY25i3C9_hg=
Effective URL: https://dfi.kaspersky.com/blog/dark-web-threats-response-guideline?mkt_tok=ODAyLUlKTi0yNDAAAAGTFTKTCYAews4DcMZ_qUFfQy3gAAQ...
Submission: On May 14 via api from BE — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="black mktoForm mktoHasWidth mktoLayoutLeft" id="mktoForm_26516" novalidate="novalidate" data-captcha="true">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="FirstName" id="LblFirstName" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="FirstName" name="FirstName" placeholder="First Name" maxlength="255" aria-labelledby="LblFirstName InstructFirstName" type="text" class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true"><span
          id="InstructFirstName" tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="LastName" id="LblLastName" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="LastName" name="LastName" placeholder="Last Name" maxlength="255" aria-labelledby="LblLastName InstructLastName" type="text" class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true"><span
          id="InstructLastName" tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Title" id="LblTitle" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="Title" name="Title" placeholder="Job Title" maxlength="255" aria-labelledby="LblTitle InstructTitle" type="text" class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true"><span id="InstructTitle"
          tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="Email" name="Email" placeholder="Business Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true"><span id="InstructEmail"
          tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Company" id="LblCompany" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="Company" name="Company" placeholder="Company" maxlength="255" aria-labelledby="LblCompany InstructCompany" type="text" class="mktoField mktoTextField mktoHasWidth mktoRequired" aria-required="true"><span
          id="InstructCompany" tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Country" id="LblCountry" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><select id="Country" name="Country" aria-labelledby="LblCountry InstructCountry" class="mktoField mktoHasWidth mktoRequired mktoSelectPlaceholder" aria-required="true">
          <option value="">Country</option>
          <option value="Abkhazia">Abkhazia</option>
          <option value="Afghanistan">Afghanistan</option>
          <option value="Aland Islands">Aland Islands</option>
          <option value="Albania">Albania</option>
          <option value="Algeria">Algeria</option>
          <option value="American Samoa">American Samoa</option>
          <option value="Andorra">Andorra</option>
          <option value="Angola">Angola</option>
          <option value="Anguilla">Anguilla</option>
          <option value="Antarctica">Antarctica</option>
          <option value="Antigua and Barbuda">Antigua and Barbuda</option>
          <option value="Argentina">Argentina</option>
          <option value="Armenia">Armenia</option>
          <option value="Aruba">Aruba</option>
          <option value="Australia">Australia</option>
          <option value="Austria">Austria</option>
          <option value="Azerbaijan">Azerbaijan</option>
          <option value="Bahamas">Bahamas</option>
          <option value="Bahrain">Bahrain</option>
          <option value="Bangladesh">Bangladesh</option>
          <option value="Barbados">Barbados</option>
          <option value="Belarus">Belarus</option>
          <option value="Belgium">Belgium</option>
          <option value="Belize">Belize</option>
          <option value="Benin">Benin</option>
          <option value="Bermuda">Bermuda</option>
          <option value="Bhutan">Bhutan</option>
          <option value="Bolivia">Bolivia</option>
          <option value="Bonaire, Sint Eustatius and Saba">Bonaire, Sint Eustatius and Saba</option>
          <option value="Bosnia and Herzegovina">Bosnia and Herzegovina</option>
          <option value="Botswana">Botswana</option>
          <option value="Bouvet Island">Bouvet Island</option>
          <option value="Brazil">Brazil</option>
          <option value="British Indian Ocean Territories">British Indian Ocean Territories</option>
          <option value="British Virgin Islands">British Virgin Islands</option>
          <option value="Brunei Darussalam">Brunei Darussalam</option>
          <option value="Bulgaria">Bulgaria</option>
          <option value="Burkina Faso">Burkina Faso</option>
          <option value="Burundi">Burundi</option>
          <option value="Cambodia">Cambodia</option>
          <option value="Cameroon">Cameroon</option>
          <option value="Canada">Canada</option>
          <option value="Cape Verde">Cape Verde</option>
          <option value="Cayman Islands">Cayman Islands</option>
          <option value="Central African Republic">Central African Republic</option>
          <option value="Chad">Chad</option>
          <option value="Chile">Chile</option>
          <option value="China">China</option>
          <option value="Christmas Island">Christmas Island</option>
          <option value="Cocos (Keeling) Islands">Cocos (Keeling) Islands</option>
          <option value="Colombia">Colombia</option>
          <option value="Comoros">Comoros</option>
          <option value="Congo (DRC)">Congo (DRC)</option>
          <option value="Congo (Republic of)">Congo (Republic of)</option>
          <option value="Cook Islands">Cook Islands</option>
          <option value="Costa Rica">Costa Rica</option>
          <option value="Cote D'Ivoire">Cote D'Ivoire</option>
          <option value="Croatia">Croatia</option>
          <option value="Cuba">Cuba</option>
          <option value="Curacao">Curacao</option>
          <option value="Cyprus">Cyprus</option>
          <option value="Czech Republic">Czech Republic</option>
          <option value="Denmark">Denmark</option>
          <option value="Djibouti">Djibouti</option>
          <option value="Dominica">Dominica</option>
          <option value="Dominican Republic">Dominican Republic</option>
          <option value="Ecuador">Ecuador</option>
          <option value="Egypt">Egypt</option>
          <option value="El Salvador">El Salvador</option>
          <option value="Equatorial Guinea">Equatorial Guinea</option>
          <option value="Eritrea">Eritrea</option>
          <option value="Estonia">Estonia</option>
          <option value="Eswatini">Eswatini</option>
          <option value="Ethiopia">Ethiopia</option>
          <option value="Falkland Islands">Falkland Islands</option>
          <option value="Faroe Islands">Faroe Islands</option>
          <option value="Fiji">Fiji</option>
          <option value="Finland">Finland</option>
          <option value="France">France</option>
          <option value="France, Metropolitan">France, Metropolitan</option>
          <option value="French Guiana">French Guiana</option>
          <option value="French Polynesia">French Polynesia</option>
          <option value="French Southern Territories">French Southern Territories</option>
          <option value="Gabon">Gabon</option>
          <option value="Gambia">Gambia</option>
          <option value="Georgia">Georgia</option>
          <option value="Germany">Germany</option>
          <option value="Ghana">Ghana</option>
          <option value="Gibraltar">Gibraltar</option>
          <option value="Greece">Greece</option>
          <option value="Greenland">Greenland</option>
          <option value="Grenada">Grenada</option>
          <option value="Guadeloupe">Guadeloupe</option>
          <option value="Guam">Guam</option>
          <option value="Guatemala">Guatemala</option>
          <option value="Guernsey">Guernsey</option>
          <option value="Guinea">Guinea</option>
          <option value="Guinea-Bissau">Guinea-Bissau</option>
          <option value="Guyana">Guyana</option>
          <option value="Haiti">Haiti</option>
          <option value="Heard Island And Mcdonald Islands">Heard Island And Mcdonald Islands</option>
          <option value="Honduras">Honduras</option>
          <option value="Hong Kong">Hong Kong</option>
          <option value="Hungary">Hungary</option>
          <option value="Iceland">Iceland</option>
          <option value="India">India</option>
          <option value="Indonesia">Indonesia</option>
          <option value="Iran">Iran</option>
          <option value="Iraq">Iraq</option>
          <option value="Ireland">Ireland</option>
          <option value="Isle of Man">Isle of Man</option>
          <option value="Israel">Israel</option>
          <option value="Italy">Italy</option>
          <option value="Jamaica">Jamaica</option>
          <option value="Japan">Japan</option>
          <option value="Jersey">Jersey</option>
          <option value="Jordan">Jordan</option>
          <option value="Kazakhstan">Kazakhstan</option>
          <option value="KDPR">KDPR</option>
          <option value="Kenya">Kenya</option>
          <option value="Kiribati">Kiribati</option>
          <option value="Korea">Korea</option>
          <option value="Kosovo">Kosovo</option>
          <option value="Kuwait">Kuwait</option>
          <option value="Kyrgyzstan">Kyrgyzstan</option>
          <option value="Lao Peoples Democratic Republic">Lao Peoples Democratic Republic</option>
          <option value="Latvia">Latvia</option>
          <option value="Lebanon">Lebanon</option>
          <option value="Lesotho">Lesotho</option>
          <option value="Liberia">Liberia</option>
          <option value="Libya">Libya</option>
          <option value="Liechtenstein">Liechtenstein</option>
          <option value="Lithuania">Lithuania</option>
          <option value="Luxembourg">Luxembourg</option>
          <option value="Macau">Macau</option>
          <option value="Madagascar">Madagascar</option>
          <option value="Malawi">Malawi</option>
          <option value="Malaysia">Malaysia</option>
          <option value="Maldives">Maldives</option>
          <option value="Mali">Mali</option>
          <option value="Malta">Malta</option>
          <option value="Marshall Islands">Marshall Islands</option>
          <option value="Martinique">Martinique</option>
          <option value="Mauritania">Mauritania</option>
          <option value="Mauritius">Mauritius</option>
          <option value="Mayotte">Mayotte</option>
          <option value="Mexico">Mexico</option>
          <option value="Micronesia">Micronesia</option>
          <option value="Moldova">Moldova</option>
          <option value="Monaco">Monaco</option>
          <option value="Mongolia">Mongolia</option>
          <option value="Montenegro">Montenegro</option>
          <option value="Montserrat">Montserrat</option>
          <option value="Morocco">Morocco</option>
          <option value="Mozambique">Mozambique</option>
          <option value="Myanmar">Myanmar</option>
          <option value="Namibia">Namibia</option>
          <option value="Nauru">Nauru</option>
          <option value="Nepal">Nepal</option>
          <option value="Netherlands">Netherlands</option>
          <option value="Netherlands Antilles">Netherlands Antilles</option>
          <option value="New Caledonia">New Caledonia</option>
          <option value="New Zealand">New Zealand</option>
          <option value="Nicaragua">Nicaragua</option>
          <option value="Niger">Niger</option>
          <option value="Nigeria">Nigeria</option>
          <option value="Niue">Niue</option>
          <option value="Norfolk Island">Norfolk Island</option>
          <option value="North Macedonia">North Macedonia</option>
          <option value="Northern Mariana Islands">Northern Mariana Islands</option>
          <option value="Norway">Norway</option>
          <option value="Oman">Oman</option>
          <option value="Pakistan">Pakistan</option>
          <option value="Palau">Palau</option>
          <option value="Palestinian Authority">Palestinian Authority</option>
          <option value="Panama">Panama</option>
          <option value="Papua New Guinea">Papua New Guinea</option>
          <option value="Paraguay">Paraguay</option>
          <option value="Peru">Peru</option>
          <option value="Philippines">Philippines</option>
          <option value="Pitcairn">Pitcairn</option>
          <option value="Poland">Poland</option>
          <option value="Portugal">Portugal</option>
          <option value="Puerto Rico">Puerto Rico</option>
          <option value="Qatar">Qatar</option>
          <option value="Reunion">Reunion</option>
          <option value="Romania">Romania</option>
          <option value="Russian Federation">Russian Federation</option>
          <option value="Rwanda">Rwanda</option>
          <option value="Saint Barthelemy">Saint Barthelemy</option>
          <option value="Saint Helena">Saint Helena</option>
          <option value="Saint Kitts and Nevis">Saint Kitts and Nevis</option>
          <option value="Saint Lucia">Saint Lucia</option>
          <option value="Saint Martin (French part)">Saint Martin (French part)</option>
          <option value="Saint Pierre and Miquelon">Saint Pierre and Miquelon</option>
          <option value="Saint Vincent and The Grenadines">Saint Vincent and The Grenadines</option>
          <option value="Samoa">Samoa</option>
          <option value="San Marino">San Marino</option>
          <option value="Sao Tome and Principe">Sao Tome and Principe</option>
          <option value="Saudi Arabia">Saudi Arabia</option>
          <option value="Senegal">Senegal</option>
          <option value="Serbia">Serbia</option>
          <option value="Seychelles">Seychelles</option>
          <option value="Sierra Leone">Sierra Leone</option>
          <option value="Singapore">Singapore</option>
          <option value="Sint Maarten (Dutch part)">Sint Maarten (Dutch part)</option>
          <option value="Slovakia">Slovakia</option>
          <option value="Slovenia">Slovenia</option>
          <option value="Solomon Islands">Solomon Islands</option>
          <option value="Somalia">Somalia</option>
          <option value="South Africa">South Africa</option>
          <option value="South Georgia and Sandwich Islands">South Georgia and Sandwich Islands</option>
          <option value="South Ossetia">South Ossetia</option>
          <option value="South Sudan">South Sudan</option>
          <option value="Spain">Spain</option>
          <option value="Sri Lanka">Sri Lanka</option>
          <option value="Sudan">Sudan</option>
          <option value="Suriname">Suriname</option>
          <option value="Svalbard and Jan Mayen">Svalbard and Jan Mayen</option>
          <option value="Sweden">Sweden</option>
          <option value="Switzerland">Switzerland</option>
          <option value="Syria">Syria</option>
          <option value="Taiwan">Taiwan</option>
          <option value="Tajikistan">Tajikistan</option>
          <option value="Tanzania">Tanzania</option>
          <option value="Thailand">Thailand</option>
          <option value="Timor-Leste">Timor-Leste</option>
          <option value="Togo">Togo</option>
          <option value="Tokelau">Tokelau</option>
          <option value="Tonga">Tonga</option>
          <option value="Trinidad and Tobago">Trinidad and Tobago</option>
          <option value="Tunisia">Tunisia</option>
          <option value="Turkey">Turkey</option>
          <option value="Turkmenistan">Turkmenistan</option>
          <option value="Turks and Caicos Islands">Turks and Caicos Islands</option>
          <option value="Tuvalu">Tuvalu</option>
          <option value="Uganda">Uganda</option>
          <option value="Ukraine">Ukraine</option>
          <option value="United Arab Emirates">United Arab Emirates</option>
          <option value="United Kingdom">United Kingdom</option>
          <option value="United States Minor Outlying Islands">United States Minor Outlying Islands</option>
          <option value="United States of America">United States of America</option>
          <option value="United States Virgin Islands">United States Virgin Islands</option>
          <option value="Uruguay">Uruguay</option>
          <option value="Uzbekistan">Uzbekistan</option>
          <option value="Vanuatu">Vanuatu</option>
          <option value="Vatican City State">Vatican City State</option>
          <option value="Venezuela">Venezuela</option>
          <option value="Viet Nam">Viet Nam</option>
          <option value="Wallis And Futuna Islands">Wallis And Futuna Islands</option>
          <option value="Western Sahara">Western Sahara</option>
          <option value="Yemen">Yemen</option>
          <option value="Zambia">Zambia</option>
          <option value="Zimbabwe">Zimbabwe</option>
        </select><span id="InstructCountry" tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoPlaceholder mktoPlaceholderState"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Phone" id="LblPhone" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="Phone" name="Phone" placeholder="Phone Number" maxlength="255" aria-labelledby="LblPhone InstructPhone" type="tel" class="mktoField mktoTelField mktoHasWidth mktoRequired" aria-required="true"><span id="InstructPhone"
          tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="Nodes__c" id="LblNodes__c" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label><input id="Nodes__c" name="Nodes__c" placeholder="Number of workstation" maxlength="2000" aria-labelledby="LblNodes__c InstructNodes__c" type="number" class="mktoField mktoNumberField mktoHasWidth mktoRequired" min="" max="" step=""
          aria-required="true"><span id="InstructNodes__c" tabindex="-1" class="mktoInstruction"></span></div>
    </div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Source" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="Campaign_Medium" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow mktoFlexRow">
    <div class="mktoFieldDescriptor mktoFormCol">
      <div class="mktoFieldWrap mktoRequiredField"><label for="subscriptionSingleOptIn" id="LblsubscriptionSingleOptIn" class="mktoLabel mktoHasWidth">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoLogicalField mktoCheckboxList mktoHasWidth mktoRequired"><input name="subscriptionSingleOptIn" id="subscriptionSingleOptIn" type="checkbox" value="yes" aria-required="true"
            aria-labelledby="LblsubscriptionSingleOptIn InstructsubscriptionSingleOptIn" class="mktoField"><label for="subscriptionSingleOptIn" id="LblsubscriptionSingleOptIn"></label></div><span id="InstructsubscriptionSingleOptIn" tabindex="-1"
          class="mktoInstruction"></span>
      </div>
    </div>
    <div class="mktoFormCol">
      <div class="mktoFieldWrap">
        <div class="mktoHtmlText mktoHasWidth">
          <p><em>I agree to provide my contact information to Kaspersky (first name, last name, email address, phone, country postal code) to be contacted by Kaspersky sales representatives by phone for a personalized offer that could be based, in
              particular, on geography and company size information provided; to receive information via email about Kaspersky products and services including promotional offers, product updates and premium assets like white papers, webcasts, videos,
              events; to participate in surveys to vocalize opinion on various aspects of Kaspersky business, in particular, about products, and technical support. I understand that I can withdraw this consent at any time via unsubscribe link from
              email or via </em><a href="https://www.kaspersky.com/web-privacy-policy"><em>Privacy Policy</em></a></p>
        </div>
      </div>
    </div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="subscriptionTextVersion" class="mktoField mktoFieldDescriptor mktoFormCol" value="3"></div>
  <div class="mktoFormRow"><input type="hidden" name="utm_campaign" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="utm_content" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="utm_medium" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="utm_source" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="utm_term" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="klig__c" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="clientid__c" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow"><input type="hidden" name="gclid__c" class="mktoField mktoFieldDescriptor mktoFormCol" value=""></div>
  <div class="mktoFormRow" id="g-recaptcha-26516">
    <div style="width: 304px; height: 78px;">
      <div><iframe title="reCAPTCHA" width="304" height="78" role="presentation" name="a-mshplrbetkgj" frameborder="0" scrolling="no"
          sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
          src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6Lf2eUQUAAAAAC-GQSZ6R2pjePmmD6oA6F_3AV7j&amp;co=aHR0cHM6Ly9kZmkua2FzcGVyc2t5LmNvbTo0NDM.&amp;hl=de&amp;v=vjbW55W42X033PfTdVf6Ft4q&amp;size=normal&amp;cb=p8uncfu967lm"></iframe>
      </div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
        style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
    </div><iframe style="display: none;"></iframe>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple"><button type="submit" class="mktoButton" data-om-cta="send">DOWNLOAD THE REPORT</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="26516"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="802-IJN-240">
</form>

<form class="black mktoForm mktoHasWidth mktoLayoutLeft" novalidate="novalidate"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

 * Threat Intelligence
 * Solutions
 * Industries
 * Products
 * Services
 * Resource Center
 * About Us

 * Arabic
 * Chinese Simplified
 * Dutch
 * English
 * German
 * Italian
 * 日本語
 * Portuguese Brazilian (PT-BR)
 * Russian
 * Spanish
 * Spanish Latin American (ESLA)
 * Turkish

 * Overview
 * Service coverage
 * How it works
 * Benefits
 * Blog
 * Get in touch with team

Get in touch with team
 * Arabic
 * Chinese Simplified
 * Dutch
 * English
 * German
 * Italian
 * 日本語
 * Portuguese Brazilian (PT-BR)
 * Russian
 * Spanish
 * Spanish Latin American (ESLA)
 * Turkish

29 min.


WHAT TO DO IF YOUR COMPANY WAS MENTIONED ON THE DARK WEB?

Data breaches have become a pervasive threat to businesses of all sizes, with
cybercriminals constantly finding new ways to steal sensitive information. In
recent years, high-profile data breaches have made headlines, causing
reputational damage for the affected companies. A statistical overview of the
data breach problem and cybercriminal activity on the Dark Web is provided on a
Kaspersky’s Securelist.com. In this article, we will provide insights into how
businesses should handle data breaches and the steps they can take to mitigate
the impact of such incidents.

Download Incident Response Playbook Go to Incident Response Guideline


INCIDENT RESPONSE: APPROACH, STEPS AND ROLES

Before we dive into incident response process, it's essential to discuss how
Dark Web incidents fit into the classic approach to incident response. Effective
incident management is carried out in several steps.
Incidents related to breaches announced on the Dark Web are the same as others
in terms of response, but there are some differences in the first steps:
preparation, detection and analysis.
Verifying Dark Web threats and evaluating their severity requires special
methods. If the incident is verified and confirmed, the incident response (IR)
team can use the relevant standard IR playbooks to respond.


 * PREPARATION
   
   Prepare the people, processes, and technologies in the organization required
   to manage Dark Web incidents efficiently

 * 


 * DETECTION
   
   Define detection scenarios for Dark Web mentions and required tools/services

 * 


 * ANALYSIS
   
   Investigate the mention and assess its threat level

 * 


 * VERIFICATION
   
   Verify the incident and start the incident response process

 * 


 * CONTAINMENT
   
   Isolate compromised systems and take initial actions to prevent further
   damage

 * 


 * ERADICATION
   
   Eliminate components involved in the incident and address the main root cause

 * 


 * COMMUNICATION
   
   Organize communication with media and customers


THERE ARE THREE TYPICAL ROLES INVOLVED IN THE INCIDENT RESPONSE PROCESS:


 * CYBER THREAT INTELLIGENCE (CTI) ANALYST
   
   who handles and initially processes the CTI alert and creates an incident.


 * SECURITY OPERATIONS CENTER (SOC) ANALYST
   
   who investigates the identified incident.


 * INCIDENT RESPONDER
   
   who performs the necessary actions to respond to the threat.

It's not important how you name the roles, and they can be combined or split –
the overall workflow will stay the same.


PREPARATION

For Dark Web-related threats, monitoring is set up in a special way. There are
two possible approaches to this: create your own system for monitoring Dark Web
resources, or use a solution specially designed for this purpose, such as
Kaspersky Digital Footprint Intelligence.

If you choose the first option you must take the following minimum set of
actions:

 1. Compile a list of Dark Web resources to monitor, relevant to your threat
    model.
 2. Deploy infrastructure (VPN, Tor; external virtual hosts for acquiring the
    data).
 3. Register special accounts on forums for intelligence purposes, since some
    forums require an account, making it more difficult for law enforcement or
    researchers to access the resource and acting as an entry barrier to casual
    visitors.
 4. Assign responsible persons for maintaining the infrastructure and an
    up-to-date list of Dark Web resources.

Choosing the second option, a ready-made solution, will save you resources and
time.

An equally important aspect of Dark Web monitoring is the scope. It's not enough
to just define the dataset to be monitored. The scope of what is monitored
should be always up-to-date. The table below contains recommendations for how
frequently the scope should be updated for different data items.

Monitoring scope Recommended
frequency of update Comment
The full/official name of the company and its subsidiaries Check every month or
in case of any M&A deals, if new names appear Write the names in different
languages (including English and the languages of the company's country of
origin and its countries of operation)
Shortened names of the company and its subsidiaries, including abbreviations
Check every month or in case of any M&A deals, if new names appear Write the
names in different languages (including English and the languages of the
company's country of origin and its countries of operation)
The list of key partners/suppliers with their names and main domains Check every
month or in case of any M&A deals, if new names appear Write the names in
different languages (including English and the languages of the company's
country of origin and its countries of operation)
The list of domains and subdomains of the company and its subsidiaries Check
every week or when new domains are registered or old ones expire without renewal
Sometimes cybercriminals mention domain names with square brackets in order to
avoid detection. Expand the search using square brackets

Example: kaspersky[.]com
The list of IP ranges of the company and its subsidiaries Check every week or in
case of registration of new IP ranges/rejection of old ones -
The names of executives and public persons Check every month or in case of
organizational structure change -
The keywords, including the main geolocation features (country, region) and
industry Check every six month or in case of a large number of false positives
Keep in mind that there will be many false positives. Restrict the keywords
based on your capacity to monitor alerts
The list of company brands and products Check every three months or in case of
new products or rebranding Example: Kaspersky Digital Footprint Intelligence
(DFI)


DETECTION

Ideally, the detection stage should involve automatic alerts when specific
information is found on Dark Web resources or in data dumps being analyzed on
your threat intelligence platform. A CTI analyst (or another responsible person)
may perform the search manually, but in this case the response will not be
immediate.


HERE'S A LIST OF BASIC ALERT TYPES:

 * Company name mentioned on the dark web
 * Company domain mentioned on the dark web
 * Company IP address/range mentioned on the dark web
 * Company brand or product mentioned on the dark web

 * Company domain mentioned in databases of leaked credentials
 * Employee name or email address mentioned on the dark web
 * Company partner/supplier mentioned on the dark web
 * Company with similar profile (location, industry) mentioned on the dark web


ANALYSIS

After receiving an alert that your company was mentioned on the Dark Web, the
first thing to do is to verify it: is the message a real threat or just a fake?
The dark web is home to cybercriminals, so it's no surprise that sometimes they
try to sell fake data to each other. At the analysis stage, CTI analysts
investigate and assess the risk.

It's necessary to try and answer the following questions: which information is
for sale, who is selling it, and where. The more information you can collect,
the faster and more effectively you can respond to the threat.


ANALYZE THE SOURCE

Dark Web content comes from many sources: forums, private blogs, and messengers.
Each platform has its own rules, audience, and specialty. Some forums are easy
to register on, some require an invite from an already-registered member, and
some are only for a selected group of "trusted" people. And of course, the
likely validity of the content differs for each sourсe. Some forums have a
strict moderation policy where all messages and posts are reviewed by the
administrators.
Ransomware blogs are another example of a source. Ransomware blogs are usually
Tor websites where ransomware actors disclose information about victims, provide
details on breaches, and set deadlines for the ransom. In some cases, ransomware
groups publish the compromised data for free, but usually they are offering to
sell the data or trying to pressure the victim company by attracting public
attention. If a company appears in the blog of a ransomware actor, there is a
high probability that this company has been hit by ransomware. But of course,
there are cases of bluffs or mistakes – for example, when LockBit claimed they
had compromised Darktrace's internal systems, but the company confirmed that
there was no evidence of compromise.


ANALYZE THE PROFILE OF THE OFFER'S AUTHOR

Many forums have a rating system: you can see how many posts the user has
published and get an idea of how experienced they are. It's also a good idea to
investigate the user's past activity, if the Dark Web resource offers this
ability: how active has the user been, have they already had successful sales?


ANALYZE THE AUTHOR'S ACTIVITY

How the community responds to a message is not an indicator of its validity, but
it can sometimes give more context. For example, on forums or chats,
participants may write comments thanking the author or, in contrast, saying that
data is fake.
It should be noted that some forums carefully monitor the quality of content,
and in the event of a fake publication, the author is blocked.

But even when it looks like the community is not interested in the publication,
the deal can take place "behind closed doors". Some cybercriminals prefer to
discuss details in private messages, specifically requesting this in the post
and leaving their contact information. Moreover, the escrow service is highly
popular in the community. Some forums even have this service built in. You can
read more in our article about dark web deals and regulatory mechanisms.

Based on the source and author's background you can create an attacker profile
and understand their interests. Are they an APT (Advanced Persistent Threat)
group, a hacktivist with basic tools and TTPs (tactics, techniques and
procedures) or a cybercriminal group? Perform a quick risk assessment because
not all alerts are equal in terms of risk and damage. Other factors you can
analyze are how recently the publication was made, the price, and the type of
data for sale.


THE FRESHNESS

If we take all the messages on the Dark Web as a whole, only a small number are
truly fresh publications. Some databases have been continuously republished for
a decade.


THE PRICE

Money has always been the main motivation for cybercriminal activity. The price
is usually a good indicator of the value, volume, and criticality of the data.


THE SALES MODEL

The sales model varies from message to message, often depending on the type of
data for sale. Generally, there are three sales models: free distribution, for
sale to anyone and sale to one buyer only.


THE DATA TYPE

A huge amount of data is sold on the Dark Web, for various different purposes.
In this article we're focusing on the most popular and harmful types of data
leaks.


VERIFICATION

The next step is to verify the find. The main purpose of verification is to make
sure that data has really been leaked, and then initiate the incident response
procedure accordingly.


DATA BREACHES

Usually, the seller publishes a sample of the data to help potential buyers
assess the value of the database on offer. There are cases when the leakage is
actually just publicly available data (a fake leak) or an old leak mixed with
other data. For the affected organization this helps not only to verify the
leak, but also to determine its source.


ACCESSES

It's straightforward to verify whether an account for sale is a real threat. If
someone is selling access, that means they must have gained access. Logical, no?
So, in this case, the verification step is essentially incident investigation.


COMPROMISED ACCOUNTS

Accounts for sale are email addresses and passwords or hashes. Compiling a list
of affected users based on email addresses will facilitate the process of
account verification. Since the email addresses are mostly quite predictable
(for example, in companies the domain is usually the company's name, while the
first part is the name and/or surname of the employee), cybercriminals can
generate them or obtain them using public intelligence sources. So, you may
encounter invalid email addresses, as well as email addresses belonging to
former employees.
No matter what type of account was leaked, or the current status of the
employee, it's important to check all the accounts careful to identify any
leaked ones.
A lot of credentials are stolen using credential stealers and then leaked to the
Dark Web. Many malware stealer logs available on the Dark Web contain not only
the account credentials, but also the source of the leak – the URL string of the
resource where the user was authenticated, as well as the date of compromise and
metadata from the user's device. Check if corporate resources are present in the
logs. If you find an account that was leaked from the corporate or internal
system, it could indicate that the corresponding corporate machine was
compromised. So, the list of users is not exhaustive; it's necessary to identify
and check all relevant and potentially affected hosts.

Before the next stage of incident investigation, it's essential to communicate
with all stakeholders. The main four groups are top management, regulatory
authorities (in case of law violation), media and customers.


TOP MANAGEMENT

To promptly alert top management is a must. The communication should cover all
aspects of the incident along with steps proposed and taken to address it.


MEDIA

Once an incident has been confirmed, the subsequent step, following the
notification of affected parties such as clients, and the completion of
necessary measures to mitigate the risks linked to the data leak, involves
preparing a public statement in cooperation with legal and PR departments.


REGULATORY AUTHORITIES

In many cases, according to the legislation, it's necessary to inform the
regulatory authorities when an incident is detected.


CUSTOMERS

In certain situations, it may be necessary to inform clients of compromised
accounts. This notification prompts them to take immediate action, such as
changing their password and enabling multi-factor authentication.


CONTAINMENT

When investigating an incident, it's necessary to conduct analysis of the
affected IT-systems and users.

The first crucial question is: how did the data leak happen? The second is: do
the cybercriminals still have access to the affected system?


DATA BREACHES

If there's any uncertainty about the source of the leak, it makes the work of
the technical experts much more difficult. So, it's very important to conduct a
primary analysis early on in the investigation. Starting out by identifying
systems that handled the data makes swift identification of the attack vector
that much easier.

Regarding incident investigation, let's look at two typical scenarios –
differing in terms of the type of compromise – that are highly likely to occur
in practice.

In the first scenario, an attacker compromises the database-driven web
application or website. The most common reasons for the leak are outdated
software, unpatched CVEs, and weak passwords for the admin panel. For the most
part, to prevent recurrence of the incident, it's enough to analyze the affected
web server logs and take immediate actions to close the vulnerability.

In the second case, sensitive data becomes available because the infrastructure
has been compromised in some way. Data exfiltration can be both the main purpose
and also collateral damage – when the leaked database is just the tip of the
iceberg.


ACCESSES

The possibilities of an investigation vary significantly according to
information available. If you are 99% sure that your access is for sale and the
post contains some details (for example, your company is explicitly mentioned in
the post, your SOC detected the relevant malicious activity, and so on),
analyzing the logs is a sensible move. For example, if you have an RDP Gateway,
analyze the event logs, find the suspicious account, and close the access. In
some cases, a company may consider such a reaction unnecessary. Of course,
there's a possibility that you'll be spending time and resources on
investigating a nonexistent threat. But if it does exist, responding rapidly
means preventing an attack.


COMPROMISED ACCOUNTS

From the perspective of incident investigation let's divide the compromised
accounts into 2 categories:

 1. Compromised accounts found in public leaks and/or leaked from personal
    devices.
 2. Compromised accounts leaked from corporate devices.

In both cases it's important to check the validity of the accounts. If the
account is confirmed as valid, conduct analysis of the affected IT-systems and
users' behavior in order to find suspicious events.

If someone used a corporate email address for personal use and it leaked from a
third-party resource, this is a question of adherence to security policies.

In case a user account was compromised internally, for example, via infostealer,
the corporate device might be infected and the incident could become a serious
complication. This is because the credentials could be for a domain user
account, making highly sensitive information available for potential attackers.

When it comes to accounts, "age" doesn't matter – overlooking old accounts is a
mistake. Old accounts can pose a threat because the password may not have been
changed, or may have been repeated. Besides, if an account was compromised via
infostealer, the user device could still be infected, so attackers can obtain
up-to-date passwords even if the user changes them. It is crucial to have robust
endpoint protection in place. This security measure plays a vital role in
eliminating attacks across all possible vectors.

Sometimes, conducting a full incident investigation is impossible for an
internal team – it's a time-consuming process, requiring not only resources but
also the relevant competence and experience. In this case, it's recommended to
engage qualified industry experts.


ERADICATION & RECOVERY

The exact actions in the eradication and recovery steps depend on the type of
the threat. You need to find the root cause of the incident and return affected
systems back into business operation. The following are possible steps to
restore the system to a functional state.


ACCESSES

 * Limit remote access to the compromised systems
 * Lock the compromised accounts
 * Eliminate the presence of the attacker in the infrastructure


DATA BREACHES

 * Eliminate the vulnerabilities
 * Change passwords for the affected accounts and systems
 * Eliminate the presence of the attacker in the infrastructure


COMPROMISED ACCOUNTS

 * Change passwords for the compromised accounts
 * Notify any potentially compromised employees and ask them to change their
   leaked passwords on third-party resources
 * Ensure that no suspicious activities connected to these accounts took place
 * Enforce a strict password policy
 * Perform a full antivirus check of the affected corporate devices and machines
   using an endpoint protection product


SHOULD I PAY FOR THE DATA?

Demands for ransom raise another sensitive question. Should you pay the
cybercriminals to try and keep the data safe? We always recommend not paying the
cybercriminals.

Studies indicate that giving in to ransomware demands does not guarantee that
your files will be returned. In fact, 20% of individuals who paid the ransom did
not get their files back. For businesses, too, paying the ransom does not ensure
the secure and reliable return of files. Criminals who have already infected
your computer with harmful malware and stolen your files are unlikely to act
with integrity after receiving their payment. Furthermore, paying ransoms only
motivates cybercriminals to continue their activities, resulting in production
of more malware and greater difficulties for everyone.


COMMUNICATION

At the end of incident investigation and response, the question remains: how to
communicate with the media and customers?


If notified promptly, potentially affected clients of the company-victim can
safeguard their accounts and prevent further compromise by changing their
password and enabling multi-factor authentication. It's worth noting that in
some cases, having an antivirus installed on the device is still necessary, as
certain types of malware can steal newly changed passwords.

Fines from regulators and unpleasant headlines might make you want to stay
quiet. The increased attention of regulators and tougher penalties means
financial damage as the result of a breach is becoming a more tangible threat
year on year. In 2022, the company Didi Global received one of the biggest data
privacy fines ever, a scorching $1.2 billion. Smaller fines could still be
significant for smaller companies. At the same time, the media is watching
cyber-incidents closely and presenting them to the public.

These financial, regulatory and reputational risks may hurt, but it's better to
be the first to declare. Proper communication shows how serious you are about
the breach and protecting stakeholders.


SHOULD I INFORM CUSTOMERS ABOUT THE LEAK?

We believe that communication is very important in case of a data leak. It's
about informing all concerned parties, including customers, partners, and
legislative bodies.


MY COMPANY WAS NOT MENTIONED ON THE DARK WEB, AM I SAFE?

The simple answer is no – sooner or later, your company's name will appear on
the Dark Web, as the merciless statistics show. Even if you can't find any
direct mentions of your company, there's still the possibility of finding a
related threat in some corner of the dark web. For example, access data may be
sold without mentioning the brand, or there may be the threat of leaked data of
counterparties or compromised employee credentials.

It's challenging to monitor cyberthreats on daily basis, but there's a big
chance that your sensitive business data is out there somewhere. From this
perspective, threat intelligence has become a must in today's world, in order to
keep track of leaks in a real-time. In the end, Dark Web monitoring will become
a valuable source of threat detection for your team.

Consider Dark Web monitoring as a part of your cybersecurity defense before you
have to face such incidents. Set up a monitoring procedure and assign it to your
SOC or joint teams to carry out on a continuous basis. Full procedures and
playbooks adapted for the SOC are available in our Incident Response Playbook.

Download Incidents Response Playbook


INCIDENT RESPONSE GUIDELINE

This guideline provides steps for successfully dealing with three common Dark
Web threats: breaches, sale of access and sale of compromised accounts


DISCLAIMER:

It's essential for companies to consult with legal experts and adhere to the
laws and regulations applicable in their region to ensure that their dark web
monitoring activities are legal and ethical. Additionally, transparent and
ethical practices should guide their approach to cybersecurity and data
protection. If you encounter any difficulties with a step, don't hesitate to
reach out to experts specializing in Dark Web threats and incident response. You
can continue progressing through the steps, but it's important to remember that
seeking their assistance can help you address the threat more effectively.


HAS YOUR COMPANY BEEN MENTIONED ON THE DARK WEB?

Yes
No

1


CAN YOU IDENTIFY THE ORIGIN OF THE MENTION?

How to do it:

1) Try different approaches for accessing various Dark Web sources:

 * Deploy infrastructure for accessing Dark Web resources and hiding your origin
   (for example, VPN).
 * If the source requires registration, you might consider creating an account
   specialized for intelligence purposes. Some sources may require special
   software to access, like the Tor browser or a particular messenger.

2) Search for all the mentions:

 * If there are many posts with the same content, the initial mention should be
   your top priority to analyze.
 * Cybercriminals have many resources at their disposal to advertise the leak.
   Other members of the community can also re-share it. Consider creating a full
   lists of mentions for additional analysis.


IS IT POSSIBLE TO CREATE AN ATTACKER PROFILE?

How to do it:

1) Evaluate the perpetrator’s (author of the post in the Dark Web) level of
experience:

 * Rating. Look for the date they registered or their forum rating (are they a
   new or experienced user?).
 * Former activity. Search for previous messages/posts by the author.
 * Participation on other forums. Search for users with the same username on
   other forums and Dark Web resources.
 * Community gratitude. Observe how other members have expressed thanks or
   complaints to this perpetrator.

2) Analyze the threads the user normally participates in. Does the message/post
relate to their main area of interest?

3) Search for the perpetrator’s “successful” activity:

 * Is it possible to find out what happened with previous offers? Try to find
   any evidence that the user has made any successful deals.
 * Have the offers received any kind of attention from the community? View
   reactions and comments from other forum members.

2


3


CAN YOU ESTIMATE THE RISK POSED BY THE ANNOUNCEMENT?

How to do it:

1) Check the date of the offer. How long has it been available on the
underground resource? Is it a new offer or an old one?

2) Check the newness. Sometimes cybercriminals republish old breaches,
presenting them as fresh new breach. Search for topic matches in old posts and
messages.

3) Check the content of the breached data. Analyze the price, value, and volume
of compromised data, the format offered, and so on.

4) Check the deal conditions. Is the offer free or for sale? Is it for sale to
anyone or to one buyer only?


IDENTIFY THE THREAT TYPE

Is the post related to a data breach?
Is the post related to the sale of remote access?
Is the post related to the sale of compromised account(s)?
?


4


CAN YOU VERIFY THE DATA BREACH?

How to do it:

1) Check the data samples that the attacker has provided for proof that they
really have data worth paying for. The samples could be part of the
advertisement or published separately on request (for example, in the comments
section).

Before opening any files downloaded from the dark web, it's crucial to exercise
caution and scan them with an antivirus program. It's also recommended to run
them in an isolated environment for added security.

2) Analyze all the information available in the message: the exact source of the
breach, the date of compromise, the data format, and other proofs of data
authenticity.

3) Compare the information collected from the advertisement with the real data
you have. Does your company work with such data? Does your company have a
system/service that operates with this information?


CAN YOU SCOPE THE BREACH?

How to do it:

1) Identify the initial access point that was used to compromise the system. Did
the attacker leverage a database connected with the website, or an internal
database management system with a comprehensive set of data on corporate
employees and operations?

2) Perform a detailed inspection of the system that you suspect has been
compromised. Analyze available log files to reconstruct the attack chain and
ensure that other systems are not compromised.

3) If necessary, extend the scope of the analysis.

4) Identify the amount of data which may have been compromised. The author can
only be selling a small portion of the obtained data.

5


6


HAVE YOU ALREADY MITIGATED THE EFFECTS OF THE BREACH?

How to do it:

1) Notify company management and all concerned stakeholders, including
customers, partners and regulators. Notify law enforcement bodies in accordance
with the local legal requirements for reporting incidents, especially if the
breach exposed customer data.

2) Depending on the initial vector, eliminate the cause of the breach to prevent
similar attacks in the future:

 * Fix any vulnerabilities found
 * Disable accounts if the attacker gained access using actual credentials
 * Ensure that all the latest patches are installed

3) If forensic analysis is required, isolate the system containing the breached
data.


HAVE YOU CARRIED OUT THE REMEDIATION AND LESSONS LEARNED STAGES?

How to do it:

1) Conduct root-cause analysis. Ensure that you apply all possible methods to
prevent the incident from happening again.

2) Analyze whether your current threat model is relevant. Review your current
procedures and policies and compliance with security controls.

3) Analyze your current prevention measures, such as intrusion detection
systems, antimalware solutions.

4) Review accesses and rights.

5) Eliminate vulnerabilities.

6) Change passwords for affected accounts and systems and enforce a strict
password policy.

7) Monitor network traffic to detect if an attacker attempts to initiate
connection again.

8) Continue monitoring the Dark Web to find re-publications of the same breaches
on different forums.

9) Implement a program to improve staff awareness in information security, and
conduct periodic training to monitor the awareness of each employee.

7


4


CAN YOU VERIFY THAT THE ACCESS ACTUALLY BELONGS TO YOUR COMPANY?

How to do it:

1) Analyze all the information available in the message. Look for matches in
geolocation, annual revenue, and types of systems mentioned; basically, try to
verify if the post is about your company.

2) Analyze the type of access on offer, look for matches in tools and
contractors.


CAN YOU IDENTIFY A COMPROMISED SYSTEM?

How to do it:

1) Analyze available log files and try to find signs of unauthorized access to
the system.

2) Ensure that there are no other systems affected by an attacker. If necessary,
expand the scope of the analysis.

3) If you can't find any evidence of unauthorized access to company resources,
but you're sure that the access is related to your company, consider the
possibility that it may be insider activity and conduct an investigation.

5


6


HAVE YOU DISABLED REMOTE ACCESS?

How to do it:

1) Notify employees responsible for the system that you suspect has been
compromised.

2) Eliminate the possibility of unauthorized access to infrastructure happening
again. Depending on the initial access vector discovered, do the following:

 * Fix any vulnerabilities found
 * Disable accounts if the intruder gained access using known credentials
 * Ensure that all the latest patches are installed


HAVE YOU INVESTIGATED ANY ACTIONS PERFORMED THROUGH REMOTE ACCESS?

How to do it:

Analyze available log files and check the activity of the account. Did the user
successfully reach corporate resources? Did the user have the possibility to
copy/delete/download information?

7


8


HAVE YOU CARRIED OUT THE REMEDIATION AND LESSONS LEARNED STAGES?

How to do it:

1) Conduct root-cause analysis. Ensure that you apply all possible methods to
prevent the incident from happening again.

2) Analyze whether your current threat model is relevant. Review your current
procedures and policies and compliance with security controls.

3) Analyze your current prevention measures, such as intrusion detection
systems, antimalware solutions.

4) Review accesses and rights.

5) Eliminate vulnerabilities.

6) Change passwords for affected accounts and systems and enforce a strict
password policy.

7) Monitor network traffic to detect if an attacker attempts to initiate
connection again.

8) Continue monitoring the Dark Web to find re-publications of the same breaches
on different forums.

9) Implement a program to improve staff awareness in information security, and
conduct periodic training to monitor the awareness of each employee.


4


CAN YOU IDENTIFY WHICH ACCOUNT(S) WERE BREACHED AND PUT FOR SALE ON THE DARK
WEB?

How to do it:

1) Create a list of all breached email addresses and categorize them as follows:

 * If the account has an email address on the corporate email domain, mark it as
   "Employee account".
 * If the account has an email address on a third-party email domain, mark it as
   a "Corporate resource user". This can be a partner/client or contractor
   account.
 * If the account has a login without an email domain, check that it is not a
   domain user account or an administrator or service account. If you find such
   an account, mark it as "Domain or service account".
 * Other accounts can be considered partner/customer accounts.

2) Check that users with such usernames really exist and have not been
bruteforced. If you have additional information, such as the URL or resource
where the user was authenticated, you can ask the owner of the resource to
verify the existence of the email address or login.

It's a good idea to optimize the checking process by categorizing the accounts
by type and priority.


CAN YOU CONFIRM THE ACCOUNT BREACH?

How to do it:

1) Check the validity of passwords for corporate/domain/service accounts. Since
the breach could have happened at any time in the past, it's important to review
not only new passwords, but old ones too.

2) As it's usually not possible to check the validity of user accounts, you
should assume that they are valid.

3) Prioritize accounts for further investigation. If you find a valid account,
take immediate actions to disable it.

5


6


IS THE ACCOUNT STILL VALID?

How to do it:

1) Change the passwords of the compromised accounts and notify the account
owners. If the compromised account belongs to an employee, ask them to change
the password or use the identity and access management system to force the
password change.

2) Consider disabling compromised accounts until the password is changed.

3) Advise account owners to change their passwords on other/third-party
resources, if they use the same passwords for different resources.


HAVE YOU INVESTIGATED THE ACCOUNT BREACH?

How to do it:

Using the information available, try to identify the source of the breach.

If it is a leaked database:

 * Check these accounts for associated suspicious activity. If such activity is
   detected, investigate further.

If the source of the leak is credential stealers/malware infection:

 * Perform a full antivirus scan of affected personal/corporate devices and
   machines using an endpoint protection product.
 * Check these accounts for associated suspicious activity. If such activity is
   detected, investigate further.

7


8


HAVE YOU CARRIED OUT THE REMEDIATION AND LESSONS LEARNED STAGES?

How to do it:

1) Conduct root-cause analysis. Ensure that you apply all possible methods to
prevent the incident from happening again.

2) Analyze whether your current threat model is relevant. Review your current
procedures and policies and compliance with security controls.

3) Analyze your current prevention measures, such as intrusion detection
systems, antimalware solutions.

4) Review accesses and rights.

5) Eliminate vulnerabilities.

6) Change passwords for affected accounts and systems and enforce a strict
password policy.

7) Monitor network traffic to detect if an attacker attempts to initiate
connection again.

8) Continue monitoring the Dark Web to find re-publications of the same breaches
on different forums.

9) Implement a program to improve staff awareness in information security, and
conduct periodic training to monitor the awareness of each employee.

Start again

1

Without continuous monitoring of the Dark Web, cybercriminals’ discussions
involving the company’s brand may go unnoticed. The first step in this case
would be to implement Dark Web monitoring on a constant basis.

 * For a data breach: Monitor mentions of the company’s names and main domains.

Cybercriminals usually mention the official or shorter name of the company,
abbreviations, or the main domain.

 * For sale of access: Monitor sales of access by the company’s geolocation and
   industry.

Cybercriminals prefer not to mention the company’s name in the offer, so as not
to lose the access. There are attributes which the cybercriminals usually put in
the message such as the company’s geographic location, industry, size and annual
revenue.

 * For compromised accounts: Monitor new account leakages based on mentions of
   corporate email domains or corporate resources.

Sensitive accounts can be found on internal resources (such as local or internal
IP addresses). Use AD domain as keyword to increase surface of search.


INCIDENT RESPONSE PLAYBOOK: DARK WEB BREACHES

*
*
*
*
*
*
CountryAbkhaziaAfghanistanAland IslandsAlbaniaAlgeriaAmerican
SamoaAndorraAngolaAnguillaAntarcticaAntigua and
BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire,
Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish
Indian Ocean TerritoriesBritish Virgin IslandsBrunei DarussalamBulgariaBurkina
FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African
RepublicChadChileChinaChristmas IslandCocos (Keeling)
IslandsColombiaComorosCongo (DRC)Congo (Republic of)Cook IslandsCosta RicaCote
D'IvoireCroatiaCubaCuracaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican
RepublicEcuadorEgyptEl SalvadorEquatorial
GuineaEritreaEstoniaEswatiniEthiopiaFalkland IslandsFaroe
IslandsFijiFinlandFranceFrance, MetropolitanFrench GuianaFrench PolynesiaFrench
Southern
TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard
Island And Mcdonald IslandsHondurasHong
KongHungaryIcelandIndiaIndonesiaIranIraqIrelandIsle of
ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKDPRKenyaKiribatiKoreaKosovoKuwaitKyrgyzstanLao
Peoples Democratic
RepublicLatviaLebanonLesothoLiberiaLibyaLiechtensteinLithuaniaLuxembourgMacauMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall
IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldovaMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands
AntillesNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorth
MacedoniaNorthern Mariana IslandsNorwayOmanPakistanPalauPalestinian
AuthorityPanamaPapua New
GuineaParaguayPeruPhilippinesPitcairnPolandPortugalPuerto
RicoQatarReunionRomaniaRussian FederationRwandaSaint BarthelemySaint HelenaSaint
Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and
MiquelonSaint Vincent and The GrenadinesSamoaSan MarinoSao Tome and
PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten
(Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and
Sandwich IslandsSouth OssetiaSouth SudanSpainSri LankaSudanSurinameSvalbard and
Jan
MayenSwedenSwitzerlandSyriaTaiwanTajikistanTanzaniaThailandTimor-LesteTogoTokelauTongaTrinidad
and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos
IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited States Minor
Outlying IslandsUnited States of AmericaUnited States Virgin
IslandsUruguayUzbekistanVanuatuVatican City StateVenezuelaViet NamWallis And
Futuna IslandsWestern SaharaYemenZambiaZimbabwe

*
*


*


I agree to provide my contact information to Kaspersky (first name, last name,
email address, phone, country postal code) to be contacted by Kaspersky sales
representatives by phone for a personalized offer that could be based, in
particular, on geography and company size information provided; to receive
information via email about Kaspersky products and services including
promotional offers, product updates and premium assets like white papers,
webcasts, videos, events; to participate in surveys to vocalize opinion on
various aspects of Kaspersky business, in particular, about products, and
technical support. I understand that I can withdraw this consent at any time via
unsubscribe link from email or via Privacy Policy











DOWNLOAD THE REPORT

Get full procedures and playbooks adapted for the SOC. Create new playbooks or
adjust an existing playbook collection to smoothly integrate Dark Web threat
response into your SOC response portfolio. Train your team in advance to handle
such cases and be prepared. Add these exercises to your Tabletop Exercise (TTX)
or drills program.

 * Threat Intelligence
 * Solutions
 * Industries
 * Products
 * Services
 * Resource Center
 * About Us

© 2024 AO Kaspersky. All Rights Reserved

 * Privacy Policy
 * Contacts