RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

DLBI: Data Leakage & Breach Intelligence

Product
Developers: DLBI (Dee El B Ay)
Date of the premiere of the system: 2022/11/17
Technology: Data Mining

The main articles are:

2023: Provision of data for the FinZashchita service

On August 28, 2023, the MTS ecosystem launched the FinZashchita service for individuals, which allows you to track the actions of credit fraudsters and helps to monitor the safety of user data. On the service website, customers will be able to check for free whether their phone number and other data have entered the fraudsters' databases. Information about data leaks for this service is provided by the project partner, the DLBI (Data Leakage & Breach Intelligence) service, a Russian service for intelligence of vulnerabilities and data leaks, as well as monitoring fraudulent resources on the darknet. Read more here.

2022: Opening the API to the Data Leakage & Break Intelligence monitoring system

Russian service intelligence data breaches Darknet DLBI and monitoring opened to the API monitoring system. DLBI Data Leakage & Breach Intelligence announced this on November 17, 2022. Now the company's customers can to integrate monitor the darknet with their own funds information security and automatically receive and process notifications about the appearance of their data leaks.

The real-world time broadest monitoring and darknet network Internet allows DLBI to detect leaks before they become available to members of the professional community, and even more so before information they enter the public field.

One of the features of Data Leakage & Break Intelligence is the automatic identification of compromised accounts, including logins and passwords, which allows you to prohibit their use faster than hackers can use this data in attacks based on password reuse.

To identify leaked passwords, one of the large account databases with a volume of more than 7.6 billion login-password pairs is used, of which almost 1 billion was added in 2022. Constant replenishment of the base is carried out using monitoring of darknet sites, Telegram channels and closed forums.

File:Aquote1.png
Password reuse attacks are becoming a real headache for information security services. Logins and passwords that comply with formal rules get leaked, and then collected by hackers and used to attack corporate and government resources. In particular, a similar scheme was used by Ukrainian "Hacktevists" in several recent attacks on the websites of Russian departments,
noted DLBI founder, Ashot Hovhannisyan.
File:Aquote2.png