Read on for highlights from DarkOwl’s Product Team for Q4 that wrapped up 2024, including new exciting product features.
The team is thrilled to announce that one of our most requested features from clients went live this quarter. Cases are a way to organize projects and work collaboratively in DarkOwl Vision UI. They can help keep track of a specific topic or assignment, including all related alerts, saved searches, and search blocks. The main Case Overview page will give you summary information about the work you’ve added and your Case Alerts. Additionally, it will display events related to the Case in the Activity section.
You can set up an individual Case or invite other users or teams in your organization to work on a Case together. Vision UI now supports organization roles and team management, granting administrators the ability to group their users into teams. Teams can manage Cases together, to work together on keyword lists, share searches, and jointly manage a shared set of Alerts.
The team made our Stealer Log content more visible and useful, including tagging results with Stealer Log to quickly identify their source. You can use a new “See files from this machine” workflow from a search result to find other results taken from the same machine. Finally, new filters allow you to easily search within results from Stealer Logs, or exclude them from your result set.
In addition to labeling Stealer Logs, we have expanded our source site classification tagging to include seven additional classifications, including: blogs, data sharing, directory, file repository, news, search engines, and social media. These are displayed on search results to help identify the content available from the source domain.
DarkOwl Vision Knowledge Base
In addition to product features, we have expanded our help documentation and support materials. This quarter, we launched an easy-to-search, article-style Knowledge Base that includes expanded documentation. Now it’s easier than ever to find answers to common FAQs and step-by-step help.
This quarter was another one of growth in data collection. Notably, we had a significant increase in total emails and unique emails this quarter due to several leaks that contained a large amount of email addresses.
The team had 9.5% growth in email addresses, 10.9% growth in credit card numbers, 22% increase in total collected ZeroNet documents, a 12% growth in total collected Tor documents, 26% increase in paste documents, and another 19% growth in total collected records from Telegram – just to highlight a few.
When your search results are from data leaks, users can review additional information curated by DarkOwl analysts, giving you enrichment on the data leak. The descriptions below are all available in our Leak Context product feature.
Data purported to be from BBVA Bank was posted on BreachForums, a hacking forum, on November 11, 2024. According to the post, this breach was due to a vulnerability in the BBVA Bank of Peru. Data exposed includes full names, DNI numbers, and transaction details such as vendor names, locations and discounts applied.
Data purported to be from California Secretary of State was posted on BreachForums, a hacking forum, on October 18, 2024. According to the post, the leak consists of various .csv files containing PII on businesses and individuals. Data exposed includes user identification number (UID), full names, physical addresses, company names, and associated details and government documents.
Data purported to be from Crowdera was posted on BreachForums, a hacking forum, on December 3, 2024. According to the post, in November 2024, Crowdera experienced data breach exposing 80,095 users. Data exposed includes user identification numbers (UID), full names, dates of birth, phone numbers, physical addresses, pan card numbers, Aadhaar numbers, and email addresses.
Data purported to be from Pure Incubation was posted on BreachForums, a hacking forum, on August 15, 2024. According to the post, this leak is from February 28, 2024 and claims to contain 132.8 million records. Data exposed includes names, physical addresses, email addresses, company names, and phone numbers.
Products
Services
Use Cases