{"id":10729,"date":"2023-09-04T05:09:00","date_gmt":"2023-09-03T17:09:00","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=10729"},"modified":"2023-09-04T05:09:00","modified_gmt":"2023-09-03T17:09:00","slug":"putting-a-light-on-the-darkweb-with-upgraded-monitoring","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=10729","title":{"rendered":"Putting a light on the dark web with upgraded monitoring"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2023\/09\/JasperArt_2023-09-08_08.15.36.png&#8221; background_size=&#8221;stretch&#8221; width=&#8221;78%&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;15px||15px|0px|false|false&#8221; border_radii=&#8221;off|20px|20px|20px|20px&#8221; border_color_all=&#8221;#222222&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(160,160,160,0.9)&#8221; custom_margin=&#8221;55px|45px||25px|false|false&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; border_radii=&#8221;on|20px|20px|20px|20px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><span style=\"color: #000000;\">What&#8217;s the Dark Web?<\/span><\/h2>\n<p><strong><span style=\"color: #000000;\">The Dark Web, is often associated with a veil of notoriety, is a part of the internet intentionally hidden from traditional search engines.<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #000000;\">It requires specific software, such as Tor, to access, offering an anonymous platform where privacy is paramount.<\/span><\/strong><\/p>\n<p><strong><span style=\"color: #000000;\">Our concern is its use for illegal activities due to its anonymity and its collection of marketplaces for illegal and stolen content.<\/span><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">&#8220;Dark Web&#8221; monitoring is an important feature of our security solutions.<\/span><\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">The Dark Web monitoring is there to alert you about any leakage of login information into the hacker space.<\/span><\/p>\n<h2 class=\"x_MsoNormal\"><span style=\"color: #000000;\">But the Dark Web is a big place and that can result in a lot of noise.<\/span><\/h2>\n<p><span style=\"color: #000000;\">\u00a0<\/span><\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">To help you keep focus, we are changing how we report and alert.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;http:\/\/kinetics.co.nz\/wp-content\/uploads\/2023\/09\/DarkWeb-Reports.jpg&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.22.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;rgba(255,255,255,0.87)&#8221; background_enable_image=&#8221;off&#8221; background_blend=&#8221;lighten&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;rgba(33,7,7,0.35)&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2 class=\"x_MsoNormal\" aria-hidden=\"true\"><span style=\"color: #000000;\"><b>Kinetics KARE dark web data alerting is now more refined.<\/b><\/span><\/h2>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">On the Dark Web information is sold, repackaged and sold again.\u00a0 Sometimes publicly available information such as an email address and phone number are sold as leaked data.<\/span><\/p>\n<h4 class=\"x_MsoNormal\"><span style=\"color: #000000;\">We have refined our alerting to focus on only information that includes a password.<\/span><\/h4>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">This removes a lot of noise and keeps alerts focused.<\/span><\/p>\n<h2 class=\"x_MsoNormal\"><span style=\"color: #000000;\"><b>Deeper Scanning.<\/b><\/span><\/h2>\n<h4 class=\"x_MsoNormal\"><span style=\"color: #000000;\">Our scans now penetrate deeper into the Dark Web.<\/span><\/h4>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">When you see the source as \u201cNot Disclosed\u201d, it indicates that the source is going to be something like a hacker group or forum that is not aware they are being monitored.<\/span><\/p>\n<h2 class=\"x_MsoNormal\"><span style=\"color: #000000;\"><b>More helpful leak information.<\/b><\/span><\/h2>\n<h4 class=\"x_MsoNormal\"><span style=\"color: #000000;\">With a lot of the noise removed, we can now focus on on the most important information.<\/span><\/h4>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">For example: what is the account and what password is out there?\u00a0 If the password is available unencrypted we will display the first three characters (ie:\u00a0 PasXXXXX).\u00a0 This helps you identity the possible source or age of the information.<\/span><\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">If an encrypted version is circulating, we will state that it is encrypted.\u00a0 Encrypted passwords are still a major risk.\u00a0 They can be sold with information about how they were encrypted, letting the buyer then run their own unencrypt technology against the password.<\/span><\/p>\n<p class=\"x_MsoNormal\" aria-hidden=\"true\"><span style=\"color: #000000;\">It is important to remember that a login and password are not always about Office 365.\u00a0 We use many online services, and any one of them may offer that crack that the thief may sneak through.<\/span><\/p>\n<h2 class=\"x_MsoNormal\" aria-hidden=\"true\"><span style=\"color: #000000;\"><b>Casting a wide net.<\/b><\/span><\/h2>\n<h4 class=\"x_MsoNormal\"><span style=\"color: #000000;\">We still search out all leaks associated with your email domain.<\/span><\/h4>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">That is very important as many systems report only on current staff emails.\u00a0 That can easily miss important logins which may use a generic \u00a0address.\u00a0 They may also miss a login that may be associated with an ex-staff member, but is now used by others.<\/span><\/p>\n<p class=\"x_MsoNormal\" aria-hidden=\"true\"><span style=\"color: #000000;\">\u00a0We can now also search for specific public provider addresses.\u00a0 For example, you may have a company Google account that is used for setting up Android phones.\u00a0 \u00a0If you]re using a &#8220;<a href=\"mailto:company@gmail.com\" data-linkindex=\"0\" style=\"color: #000000;\">company@gmail.com&#8221; <\/a>account let us know. The same applies for any similar accounts such as yahoo, outlook.com, hotmail etc.<\/span><\/p>\n<p class=\"x_MsoNormal\" aria-hidden=\"true\"><span style=\"color: #000000;\">\u00a0We can also keep any eye on multiple email domains .\u00a0 Each extra domain has a small monthly licensing cost.<\/span><\/p>\n<h2 class=\"x_MsoNormal\"><span style=\"color: #000000;\"><b>On-Demand Reports.<\/b><\/span><\/h2>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">For our clients on KARE for Security agreements, we can easily produce a current report.\u00a0 This will list the logins, masked passwords and source.<\/span><\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\">When we are alerted to a new addition, our team will refresh and send you an updated report.<\/span><\/p>\n<p class=\"x_MsoNormal\"><span style=\"color: #000000;\"><strong>Please note &#8211; as the reports are now more sensitive, we will no longer be including the list in the monthly or quarterly reports.<\/strong><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s the Dark Web? The Dark Web, is often associated with a veil of notoriety, is a part of the internet intentionally hidden from traditional search engines. It requires specific software, such as Tor, to access, offering an anonymous platform where privacy is paramount. Our concern is its use for illegal activities due to its [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":10730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-10729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/10729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10729"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/10729\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}