New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches


In 2022, inflation impacted economies worldwide with one exception - the theft of data. According to Chainalysis, a blockchain firm, ransom payments decreased by over 40% compared to 2021. This suggests that more organizations opted not to fulfill ransom demands.

However, stolen information holds significance that goes beyond its monetary value and can be exploited in unpredictable and dangerous ways. Lab 1, a new cyber surveillance system, is pinpointing the analysis of stolen data as an essential factor in securing long-term cybersecurity.

Think of data value this way:

  • Phishing attacks in the future could arise from stolen login details.
  • It is possible that using login credentials for adult-oriented websites could result in extortion attempts.
  • The information regarding travel and whereabouts of important people, such as VIPs and senior leaders, poses a potential threat to their safety.
  • And so on…

If someone doesn't pay up, hackers might respond by sharing the stolen information on internet forums. This would make the data easy to access and use for their own gain.

Shining a light on dark places#

Despite not experiencing a direct security breach, it is possible that your company's data has already been obtained by malicious individuals on the Dark Web. For this reason, Lab 1 acquires accessible data and analyzes it to determine potential risks.

Originally established as a restricted platform to safeguard protestors, the Dark Web has presently evolved to becoming a frequently used setting for illicit undertaking with roughly fifty percent of its operations being attributed to criminal activities. The International Monetary Fund's statistics reveal that marketplaces rank second in terms of demand, following only pharmaceutical and recreational drugs in popularity.

In 2022, research conducted on the industry revealed that over 24 billion combinations of usernames and passwords were being sold on the dark web, an increase from the 15 billion found in 2020. However, there are other types of records that could also be sold such as intellectual property, accountancy documents, employee information and more.

Hackers typically promote breaches by providing information about the data and demanding payment in Bitcoin through auctions. Regardless of their worth or how long they last, the Lab 1 team can assess potential risks by obtaining copies of these records.

Chain reaction#

Although it may not occur to you, your supply chain can pose a significant cybersecurity threat. As stated by the Ponemon Institute, more than half of all businesses have experienced an information breach resulting from the theft of third-party data.

The Lab 1 platform operates on the belief that data breaches can extend beyond a company's borders. This understanding is based on the fact that in a connected business environment, various tools, third-party agencies, and subcontractors utilized in day-to-day operations may pose a threat to data security.

Suppose you are a customer of a software company, and their stolen data contains access codes to the servers of numerous clients, including yours. Alternatively, what if sensitive travel information of high-profile customers is exposed and they are scheduled to attend a critical conference?

Monitor your supply chain#

The consequences of cybersecurity attacks can be avoided. Lab 1 tracks alerts and investigates information breaches throughout a company's complete chain of production by discovering and interpreting data gathered on forums, messaging systems, and the Dark Web marketplace.

By using Lab 1, companies can monitor their business associates and receive notifications if any of them experience a security breach that could be detrimental. This can prove to be advantageous for obtaining breach insurance and implementing other risk management strategies.

Lab 1 is constantly discovering new data entities at a rapid pace, with a total of 24 billion entities added to CiGraph, its graph database. Consequently, the monitoring process is ongoing.

Lab 1's systems offer an alerting service called Blast Radius, which provides security teams with relevant information as soon as incidents are recorded or data becomes accessible. This enables teams to conduct a thorough investigation into the incident.

Control the network effect of breaches

Every occurrence creates a ripple effect that can affect numerous other companies. Lab 1's Fallout service outlines this network effect and demonstrates how it affects the businesses you monitor, including your own.

In Lab 1, there is a description of the history of risk quantification and suggested solutions depending on the extent and type of security breach. The goal is to assist in preventing attacks, controlling damage, and monitoring risk levels in numerous suppliers, all with the aim of enabling businesses to create stronger supply chains.

If you suspect that there has been a secret data leak related to your company, you can visit to check for any possible Dark Web discoveries that CiGraph might uncover.

Post a Comment

Previous Post Next Post