The Digital Footprint Feed captures data related to the online activity of a specified target. It checks for data leaks due to platform compromises along with activity related to your targets on illicit networks.
On the right-hand side, you can see an overview of each instance discovered during the Digital Footprint monitoring.
Note - To know more, click on View details at the bottom right of each instance.
Filters
Select Targets
In case you have multiple targets, you can filter them to get target-specific results using this feature.
Click Select Target and select any one of the options you wish to filter.
Severity
This indicates the seriousness of the instance at hand.
The severity can be
Critical
High
Medium
Low or
Very Low
Illicit Networks
Illicit networks refer to groups of individuals or organizations that engage in unethical practices to perform malicious attacks against a target. Illicit networks use a variety of channels and methods to communicate and operate. With Horizon, you can filter the most common channels used by illicit networks to find out if information about your specified target exists on-
Market - online platforms for buying and selling falsely acquired information.
Forum Posts - various discussion forums
Chats - encrypted messaging platforms or chat rooms
Profiles - social profiles that promote dealings of stolen information
Ransome leaks - platforms used by ransomware gangs
Infected Devices - that have been compromised by malware or hacking tools
Open Web
Open web refers to publicly accessible information and resources on the internet that can be found and accessed through a standard web browser.
Horizon allows you to monitor the following elements of the open web -
Source Code - contains information, such as login credentials, IP addresses, and other details.
Paste - includes sensitive data, such as login credentials, source code, and other information.
Google Dork - these are advanced search queries that can be used to find information on the open web.
Hosts - refer to the servers that host websites and applications on the internet.
Buckets - collections of files stored in cloud storage services, such as Amazon S3.
Leaked Credentials
Leaked credentials can mean anything like usernames, passwords, email addresses, etc., that have been compromised due to a data breach. Horizon allows you to filter the list of instances by Leaked credentials to identify potential security risks to the target.
Look-a-like domains
Horizon also allows you to find Look-a-like domains. These are domains that are similar in appearance to the legitimate target domain but are controlled by a malicious actor. Look-a-like domains can be used to trick users to steal sensitive information.
You can click on View details next to a particular instance to find more information about it.
Creating Digital Footprint issues
You can also create issues for particular instances using the Actions Dropbox by clicking Actions > Confirm and Create Issue
Note - These issues will show up under the issues page, marked as Digital footprint under the category column.