HowTo: Dark Web Workflow

21st June 2025 | HowTo, MSP, Platform, Technology HowTo: Dark Web Workflow

Dark Web Reporting Within CyberHoot:

CyberHoot offers dark web monitoring and reporting for its clients by scanning user email addresses against known dark web breach databases. Any exposures found are reported directly through the CyberHoot console and via email notifications to designated administrators. Admins can then choose to follow the recommended workflow outlined in this article to review and address these exposures. Participation in this process is entirely optional and left to the discretion of each individual client.

 What to Do When You Have Dark Web Exposures:

Here’s a high level overview of the steps you may follow to review dark web exposures.

To check the exposures on the Power Platform:

  1. Select the customer in which you want to check the exposures for.
  2. Click on the “Exposed” box right from the main Dashboard view.

To check the exposures on the Autopilot Platform:

  1. Select the customer in which you want to check the exposures for.
  2. Click on Users.
  3. Click on Exposed Users.

Overall recommendations:

  1. Check the date of the exposures, sometimes those are very old and were already taken care of by the user, when in doubt, notify them.
  2. Notify the users, informing them to change their passwords and enable 2FA/MFA on the affected accounts.
  3. Here’s a sample of text to send to impacted users when using the notify feature within CyberHoot’s Power Platform:“Your accounts have been discovered on the dark web, if you still use these online accounts that have been exposed, it’s recommended that you change their passwords as well as the passwords for any other accounts that share the same password. Don’t forget to enable 2FA/MFA to further enhance their security”

     

  4. Acknowledge the exposure on the console.
Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more