World Class Intelligence and Data Gathering

Our team of ex-military intelligence officers discover and gather all kinds of data from large collections of email/password combinations to small, yet sensitive breach of SMBs in supply chains. For over five years, we’ve been collecting three (3) key datasets. Our vast database now contains over 30 billion records of recovered stolen data records.

  • Breached Records
  • Leaked Records
  • Hacker Chatter

Recovered Stolen Data Records

Stolen data records recovered via data shared by cybercriminals forums, communities, chat rooms, social media…and more. Security Rating companies like Security ScoreCard* scan 1 million-2 million domains, but we have pre-indexed data on 450 million+ domains. Our world leading dataset is on par with SpyCloud with both breadth and depth of coverage. Although we have imported 3,500 breaches, if we include compilations of breached companies, our total is closer to 25,000 breaches.

      Sample Data Includes:

  • Hackers proving access to banking systems
  • Vulnerable MS Exchange Servers
  • Stolen ID’s
  • Full Credit Cards

Recovered Leaked Data Records

Leaked data records recovered via open databases with no access controls. We have over 2 billion records recovered from 750+ leaks. All company segments are represented in this database from large corporate brands to small SMB’s

Hacker Chatter

     Stages of Attack: (This data is unique! Competitors do not have this data)

  • Reconnaissance- Hackers scan websites for vulnerabilities to exploit.
  • Attack- Hackers execute attacks against websites or web applications they believe are vulnerable.
  • Post-attack- Hackers have already gained access to a system and stolen data or are actively discussing how to steal data or how to monetize the access they’ve obtained.

Chatter is most commonly found for attacks including SQL injection, Remote Desktop Protocols (RDP), Ransomeware, and Database theft. This resource has very high value for Insurance Carriers and End-User clients.

     Sample Stolen Data Includes:

  • Exchange Servers and Office 365 Accounts
  • Remote Administration Services- Via Remote Desktop Protocol, SSH, Cpanel
  • Website and Web Applications- SQL Injection and XSS
  • Databases- Mongo DB, Elastic Search, Azure DB, and others

*https://www.upguard.com/compare/securityscorecard-vs-upguard