Identified method used to capture/steal data: How was the Date stolen or compromised?

c9d094784340-article-180530-europol-dark-web-body-1.jpg
    • Tested: the compromised data was tested to determine if it is live/active;
  • Sample: the compromised data was posted to prove its validity;

  • Keylogged or Phished: the compromised data was entered into a fictitious websiteor extracted through software designed to steal PII;

  • 3rd Party Breach: the compromised data was exposed as part of a company’s internal data breach or on a 3rd party Website;

  • Accidental Exposure: the compromised data was accidentally shared on a Web, social media, or Peer-to-Peer site;

  • Malicious / Doxed: the compromised data was intentionally broadcast to expose PII.

Please enter a valid email address.