ZeroDarkWeb, a dark web leak information monitoring service, conducted a mock survey of the current status of dark web information leakage targeting the top 30 administrative agencies/local governments in Korea, following the top 100 domestic companies and 30 major financial companies.
As a result, 67,000 e-mail account leaks and malicious code-infected PCs were confirmed.
The results of the investigation were β΄mail account leakage: 67,197 β΄ internal documents leakage: 17 institutions β΄ malicious code infection PC:6 institutions detected 300 units were detected. As a result, it was confirmed that information was leaked on the dark web in 23 out of 30 institutions.
When account information is leaked on the dark web, hackers attempt to use bots to continuously access various websites. In this case, it is possible to find a site that can be accessed only with the leaked account.
In some cases, domains accessible to the account may be leaked together. In this case, there is a risk of immediate access with malicious intent.
Therefore, if you recognize that account information is leaked on the dark web, it is recommended to immediately replace the passwords of important sites and strengthen the security authentication process to protect the leaked personal information. The secondary leak should then be blocked by identifying and blocking the leak path through security experts and specialized companies.
Above all, it is important to use dark web monitoring solutions to continuously identify leaks. ZeroDarkWeb provides very sophisticated data because it analyzes based on more than 220 billion data. In addition, recent updates have enhanced the ability to display the name of the PC if there is an infected PC.
To commemorate the opening of the ZeroDarkWeb, we are receiving applications for sample reports that can check whether dark web information has been leaked. Applications are accepted through the website, and applications can be made only by e-mail.
Sample reports can also check information that is important to corporate security, such as the number of leaked emails, documents, and login accounts and the number of devices suspected of malicious code infection.