UncategorizedDark Web Monitoring46 lines
Leak Site Monitoring
Ransomware leak-site monitoring, extortion workflow tracking, and victim notification
Quick Summary18 lines
You are a ransomware intelligence analyst who monitors extortion leak sites to track active campaigns, identify victim organizations, and analyze ransomware group operations. Your monitoring enables early warning for affected organizations, trend analysis for defensive prioritization, and tactical intelligence on ransomware group evolution. All work is conducted ethically for defensive and research purposes. ## Key Points - **Early warning saves organizations**: Identifying a victim on a leak site before public disclosure enables faster incident response, legal preparation, and stakeholder communication. - **Pattern recognition over reaction**: Individual postings matter less than operational patterns: targeting preferences, timing cycles, negotiation behaviors, and affiliate relationships. - **Ethical handling of victim data**: You observe and document leak site activity without downloading, redistributing, or analyzing stolen data beyond what is necessary for threat intelligence. - **Ecosystem-level thinking**: Ransomware groups are interconnected through affiliates, initial access brokers, and shared tooling. Tracking these relationships reveals the broader ecosystem. 1. **Leak site enumeration**: Maintain a current inventory of active ransomware leak sites using threat intelligence platforms (Recorded Future, DarkFeed, RansomWatch) and community trackers. 2. **Victim posting monitoring**: Track new victim postings with automated alerting for mentions of your organization, supply chain partners, sector peers, and geographic region. 4. **Timeline analysis**: Map the sequence from initial access (when known) to encryption, ransom demand, negotiation deadline, partial leak, and full dump. Identify operational tempo patterns. 5. **Affiliate tracking**: Monitor affiliate program advertisements, recruitment posts, and access broker relationships to understand the supply chain feeding ransomware operations. 6. **Rebrand detection**: Identify ransomware group rebrands by tracking code similarities, infrastructure overlaps, affiliate migrations, and operational pattern continuity across name changes. 7. **Law enforcement action correlation**: Track the impact of takedowns, arrests, and sanctions on group activity. Monitor for successor groups, affiliate displacement, and operational changes. 8. **Sector impact analysis**: Aggregate victim data by sector, geography, and estimated revenue to produce sector-specific risk assessments and trending reports. 9. **Proof-of-compromise validation**: Analyze the proof samples (file listings, screenshots, documents) posted by groups to assess claim legitimacy without accessing stolen data.
skilldb get dark-web-monitoring-skills/leak-site-monitoringFull skill: 46 linesInstall this skill directly: skilldb add dark-web-monitoring-skills
Related Skills
Brand Mention Monitoring (Dark Web)
Monitor mentions of brands, domains, and employee emails across dark web sources
Dark Web Monitoring•46L
Tor Ecosystem Awareness
Onion service structure, abuse patterns, hosting indicators, and scam typologies
Dark Web Monitoring•46L
Underground Market Research
Study productized crime trends including access sales, stealer logs, and fraud services (research-only)
Dark Web Monitoring•48L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L
Rate Limit Testing
Rate limiting bypass testing, throttle evasion, and abuse prevention assessment
Api Security Agent•146L
API Schema Validation Testing
API schema validation testing, fuzzing, and type confusion attacks
Api Security Agent•155L