monitoring-darkweb-sources
Monitors dark web forums, marketplaces, paste sites, and ransomware leak sites for mentions of organizational assets, leaked credentials, threatened attacks, and threat actor communications to provide early warning intelligence. Use when establishing dark web monitoring coverage, investigating specific data breach claims, or enriching incident investigations with dark web context. Activates for requests involving dark web OSINT, leak site monitoring, credential exposure, Recorded Future dark web, or Tor hidden service intelligence.
Best use case
monitoring-darkweb-sources is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Monitors dark web forums, marketplaces, paste sites, and ransomware leak sites for mentions of organizational assets, leaked credentials, threatened attacks, and threat actor communications to provide early warning intelligence. Use when establishing dark web monitoring coverage, investigating specific data breach claims, or enriching incident investigations with dark web context. Activates for requests involving dark web OSINT, leak site monitoring, credential exposure, Recorded Future dark web, or Tor hidden service intelligence.
Teams using monitoring-darkweb-sources should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/monitoring-darkweb-sources/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How monitoring-darkweb-sources Compares
| Feature / Agent | monitoring-darkweb-sources | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Monitors dark web forums, marketplaces, paste sites, and ransomware leak sites for mentions of organizational assets, leaked credentials, threatened attacks, and threat actor communications to provide early warning intelligence. Use when establishing dark web monitoring coverage, investigating specific data breach claims, or enriching incident investigations with dark web context. Activates for requests involving dark web OSINT, leak site monitoring, credential exposure, Recorded Future dark web, or Tor hidden service intelligence.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Monitoring Dark Web Sources ## When to Use Use this skill when: - Establishing continuous monitoring for organizational domain names, executive names, and product brands on dark web forums - Investigating a reported data breach claim found on a ransomware leak site or paste site - Enriching an incident investigation with context about stolen credentials or planned attacks **Do not use** this skill without proper operational security measures — dark web browsing without isolation exposes analyst infrastructure to adversary counter-intelligence. ## Prerequisites - Commercial dark web monitoring service (Recorded Future, Flashpoint, Intel 471, or Cybersixgill) - Isolated operational environment: Whonix OS or Tails OS running in a VM with no persistent storage - Keyword watchlist: organization domain, key executive names, product names, IP ranges, known credentials - Legal guidance confirming passive monitoring is authorized in your jurisdiction ## Workflow ### Step 1: Establish Keyword Monitoring via Commercial Services Configure dark web monitoring keywords in your CTI platform (e.g., Recorded Future Exposure module): - Domain variations: `company.com`, `@company.com`, `company[dot]com` - Executive names: CEO, CISO, CFO full names - Product/brand names - Internal codenames or project names (if suspected breach scope is broad) - Known email domains for credential monitoring Most commercial services (Flashpoint, Intel 471, Cybersixgill) crawl forums like XSS, Exploit[.]in, BreachForums, and Russian-language cybercriminal communities without analyst exposure. ### Step 2: Manual Investigation with Operational Security For investigations requiring direct dark web access: **Environment setup**: 1. Use a dedicated physical machine or air-gapped VM (Whonix + VirtualBox) 2. Connect via Tor Browser only — never via standard browser 3. Use a cover identity with no links to organization 4. Never log in with real credentials to any dark web site 5. Document all sessions in investigation log with timestamps **Paste site monitoring** (clearnet-accessible, no Tor required): ```bash # Hunt paste sites via API curl "https://psbdmp.ws/api/search/company.com" | jq '.data[].id' curl "https://pastebin.com/search?q=company.com" # Rate-limited public search ``` ### Step 3: Investigate Ransomware Leak Sites Ransomware groups maintain .onion leak sites. Monitor these through commercial services rather than direct access. When a claim appears about your organization: 1. Capture screenshot evidence via commercial service (do not access directly) 2. Assess legitimacy: Does the threat actor's claimed data align with any known internal systems? 3. Check timestamp: Is this claim recent or historical? 4. Cross-reference with any known security incidents or phishing campaigns from that timeframe 5. Engage IR team if claim appears credible before public disclosure Known active ransomware leak site operators (as of early 2025): LockBit (disrupted Feb 2024), ALPHV/BlackCat (disrupted Dec 2023), Cl0p, RansomHub, Play. ### Step 4: Credential Exposure Monitoring For leaked credential monitoring: - **Have I Been Pwned Enterprise**: Domain-level notification for credential exposures in breach datasets - **SpyCloud**: Commercial credential monitoring with anti-cracking and plaintext password recovery from criminal markets - **Flare Systems**: Automated monitoring of paste sites and dark web markets for credential dumps When credential exposures are confirmed: 1. Force password reset for affected accounts immediately 2. Check if credentials provide access to any organizational systems (SSO, VPN) 3. Review access logs for the period between credential exposure and detection for unauthorized access ### Step 5: Document and Escalate Findings For each dark web finding: - Capture evidence (commercial service screenshot, paste site archive) - Classify severity: P1 (imminent attack threat or active data exposure), P2 (credential exposure), P3 (general mention) - Notify appropriate stakeholders within defined SLAs - Open investigation ticket and link to evidence artifacts - Apply TLP:RED for any findings referencing named executives or specific attack plans ## Key Concepts | Term | Definition | |------|-----------| | **Dark Web** | Tor-accessible hidden services (.onion domains) not indexed by standard search engines; hosts both legitimate and criminal content | | **Paste Site** | Clearnet text-sharing sites (Pastebin, Ghostbin) frequently used to publish stolen data or malware configurations | | **Ransomware Leak Site** | .onion site operated by ransomware group to publish stolen victim data as extortion leverage | | **Operational Security (OPSEC)** | Protecting analyst identity and organizational affiliation during dark web investigation | | **Credential Stuffing** | Automated use of leaked username/password pairs against authentication systems | | **Stealer Logs** | Data packages exfiltrated by infostealer malware containing saved browser credentials, cookies, and session tokens | ## Tools & Systems - **Recorded Future Dark Web Module**: Automated monitoring of dark web sources with alerting on organization-specific keywords - **Flashpoint**: Dark web forum monitoring with human intelligence augmentation for criminal community context - **Intel 471**: Closed-source access to cybercriminal communities with structured intelligence on threat actors - **SpyCloud**: Credential exposure monitoring with recaptured plaintext passwords from criminal markets - **Have I Been Pwned Enterprise**: Domain-level breach notification API for credential monitoring at scale ## Common Pitfalls - **Direct access without OPSEC**: Accessing dark web forums without Tor and a cover identity can expose analyst IP, browser fingerprint, and organization affiliation to adversaries. - **Overreacting to unverified claims**: Ransomware groups and forum posters fabricate attack claims for extortion or reputation. Verify before escalating to incident response. - **Missing clearnet sources**: Most dark web intelligence programs miss Telegram channels, Discord servers, and paste sites which operate on the clearnet and host significant criminal activity. - **Inadequate legal review**: Dark web monitoring must be reviewed by legal counsel — passive monitoring is generally lawful but active participation in criminal markets is not. - **No evidence preservation**: Dark web content disappears rapidly. Capture timestamped evidence immediately upon discovery using commercial service exports.
Related Skills
performing-paste-site-monitoring-for-credentials
Monitor paste sites like Pastebin and GitHub Gists for leaked credentials, API keys, and sensitive data dumps using automated scraping and keyword matching to detect breaches early.
performing-dark-web-monitoring-for-threats
Dark web monitoring involves systematically scanning Tor hidden services, underground forums, paste sites, and dark web marketplaces to identify threats targeting an organization, including leaked cre
performing-brand-monitoring-for-impersonation
Monitor for brand impersonation attacks across domains, social media, mobile apps, and dark web channels to detect phishing campaigns, fake sites, and unauthorized brand usage targeting your organization.
monitoring-scada-modbus-traffic-anomalies
Monitors Modbus TCP traffic on SCADA and ICS networks to detect anomalous function code usage, unauthorized register writes, and suspicious communication patterns. The analyst uses deep packet inspection with pymodbus, Scapy, and Zeek to baseline normal PLC/RTU communication behavior, then applies statistical and rule-based anomaly detection to identify reconnaissance, parameter manipulation, and denial-of-service attacks targeting Modbus devices on port 502. Activates for requests involving Modbus traffic analysis, SCADA network monitoring, ICS anomaly detection, PLC security monitoring, or OT network threat detection.
implementing-security-monitoring-with-datadog
Implements security monitoring using Datadog Cloud SIEM, Cloud Security Management (CSM), and Workload Protection to detect threats, enforce compliance, and respond to security events across cloud and hybrid infrastructure. Covers Agent deployment, log source ingestion, detection rule creation, security dashboards, and automated notification workflows. Activates for requests involving Datadog security setup, Cloud SIEM configuration, CSM threat detection, or security monitoring dashboards.
implementing-privileged-session-monitoring
Implements privileged session monitoring and recording using Privileged Access Management (PAM) solutions, focusing on CyberArk Privileged Session Manager (PSM) and open-source alternatives. Covers session recording configuration, keystroke logging, real-time monitoring, risk-based session analysis, and compliance audit trail generation. Activates for requests involving privileged session recording, PAM session monitoring, CyberArk PSM configuration, administrator activity monitoring, or compliance session auditing.
implementing-file-integrity-monitoring-with-aide
Configure AIDE (Advanced Intrusion Detection Environment) for file integrity monitoring including baseline creation, scheduled integrity checks, change detection, and alerting
implementing-ebpf-security-monitoring
Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network connection observability, file access auditing, and runtime enforcement. Covers TracingPolicy CRD authoring with kprobe/tracepoint hooks, in-kernel filtering via matchArgs/matchBinaries selectors, JSON event export, and integration with SIEM pipelines. Use when building kernel-level runtime security observability for Linux hosts or Kubernetes clusters.
implementing-dragos-platform-for-ot-monitoring
Deploy and configure the Dragos Platform for OT network monitoring, leveraging its 600+ industrial protocol parsers, intelligence-driven threat detection analytics, and asset visibility capabilities to protect ICS environments against threat groups like VOLTZITE, GRAPHITE, and BAUXITE.
deploying-osquery-for-endpoint-monitoring
Deploys and configures osquery for real-time endpoint monitoring using SQL-based queries to inspect running processes, open ports, installed software, and system configuration. Use when building visibility into endpoint state, threat hunting across fleet, or implementing compliance monitoring. Activates for requests involving osquery deployment, endpoint visibility, fleet management, or SQL-based endpoint querying.
configuring-suricata-for-network-monitoring
Deploys and configures Suricata IDS/IPS with Emerging Threats rulesets, EVE JSON logging, and custom rules for real-time network traffic inspection, threat detection, and integration with SIEM platforms for centralized security monitoring.
zx-calculus
Coecke's ZX-calculus for quantum circuit reasoning via string diagrams with Z-spiders (green) and X-spiders (red)