CyberHoot offers dark web monitoring and reporting for its clients by scanning user email addresses against known dark web breach databases. Any exposures found are reported directly through the CyberHoot console and via email notifications to designated administrators. Admins can then choose to follow the recommended workflow outlined in this article to review and address these exposures. Participation in this process is entirely optional and left to the discretion of each individual client.
What to Do When You Have Dark Web Exposures:
Here’s a high level overview of the steps you may follow to review dark web exposures.
To check the exposures on the Power Platform:
Select the customer in which you want to check the exposures for.
Click on the “Exposed” box right from the main Dashboard view.
To check the exposures on the Autopilot Platform:
Select the customer in which you want to check the exposures for.
Click on Users.
Click on Exposed Users.
Overall recommendations:
Check the date of the exposures, sometimes those are very old and were already taken care of by the user, when in doubt, notify them.
Notify the users, informing them to change their passwords and enable 2FA/MFA on the affected accounts.
Here’s a sample of text to send to impacted users when using the notify feature within CyberHoot’s Power Platform:“Your accounts have been discovered on the dark web, if you still use these online accounts that have been exposed, it’s recommended that you change their passwords as well as the passwords for any other accounts that share the same password. Don’t forget to enable 2FA/MFA to further enhance their security”
1. How does it work? Dark Web Reports: Whenever a new exposure to a user is found in the dark web, this report will be sent out to both Super Admins and Customer Admins. This report will only report on newly found exposures that have not been ...
This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing simulations. It defines the user actions that trigger each status and describes when additional training is assigned. Field Definitions Email ...
This video was created specifically for MSPs with Super Admin access to CyberHoot’s Power Platform and its multi-tenant deployments. Client Administrators will not have access to these menus. This video provides you a quick overview of how to add a ...
This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end users using BitDefender. Warning: CyberHoot supports fake email Attack-Phishing for customers. Please keep in mind this approach uses ...
This HowTo article explains how to configure Allow Listing rules in to allow Attack Phishing tests to reach end users using MailProtector. Warning: CyberHoot supports fake email Attack-Phishing for customers. Please keep in mind this approach uses ...