Digital Footprint Monitoring Overview

Learn about what you can find under the Digital Footprint overview

The Digital Footprint Feed captures data related to the online activity of a specified target. It checks for data leaks due to platform compromises along with activity related to your targets on illicit networks.

On the right-hand side, you can see an overview of each instance discovered during the Digital Footprint monitoring.

Note - To know more, click on View details at the bottom right of each instance.

Filters

Select Targets

In case you have multiple targets, you can filter them to get target-specific results using this feature.

Click Select Target and select any one of the options you wish to filter.

Severity

This indicates the seriousness of the instance at hand.

The severity can be

  1. Critical

  2. High

  3. Medium

  4. Low or

  5. Very Low

Illicit Networks

Illicit networks refer to groups of individuals or organizations that engage in unethical practices to perform malicious attacks against a target. Illicit networks use a variety of channels and methods to communicate and operate. With Horizon, you can filter the most common channels used by illicit networks to find out if information about your specified target exists on-

  1. Market - online platforms for buying and selling falsely acquired information.

  2. Forum Posts - various discussion forums

  3. Chats - encrypted messaging platforms or chat rooms

  4. Profiles - social profiles that promote dealings of stolen information

  5. Ransome leaks - platforms used by ransomware gangs

  6. Infected Devices - that have been compromised by malware or hacking tools

Open Web

Open web refers to publicly accessible information and resources on the internet that can be found and accessed through a standard web browser.

Horizon allows you to monitor the following elements of the open web -

  1. Source Code - contains information, such as login credentials, IP addresses, and other details.

  2. Paste - includes sensitive data, such as login credentials, source code, and other information.

  3. Google Dork - these are advanced search queries that can be used to find information on the open web.

  4. Hosts - refer to the servers that host websites and applications on the internet.

  5. Buckets - collections of files stored in cloud storage services, such as Amazon S3.

Leaked Credentials

Leaked credentials can mean anything like usernames, passwords, email addresses, etc., that have been compromised due to a data breach. Horizon allows you to filter the list of instances by Leaked credentials to identify potential security risks to the target.

Look-a-like domains

Horizon also allows you to find Look-a-like domains. These are domains that are similar in appearance to the legitimate target domain but are controlled by a malicious actor. Look-a-like domains can be used to trick users to steal sensitive information.

You can click on View details next to a particular instance to find more information about it.


Creating Digital Footprint issues

You can also create issues for particular instances using the Actions Dropbox by clicking Actions > Confirm and Create Issue

Note - These issues will show up under the issues page, marked as Digital footprint under the category column.

Did this answer your question?
😞
😐
😁