StealthMole Integration

StealthMole monitors the Deep and Dark Web (DDW) for compromised credentials, focusing on breaches that evade traditional security. Updated daily, it delivers near real-time insights to help businesses protect corporate assets and sensitive information.

Where do the credentials come from?

StealthMole sources data from breached databases, stealer malware logs, and combo lists, using specialized modules:

  • Compromised Data Set (CDS) – Tracks credentials stolen via stealer malware (for example, RedLine, Vidar, Raccoon), enabling searches for compromised accounts.

  • ULP Binder (UB) – Finds URL-Login-Password bundles leaked by stealer malware, aiding in the detection and protection of exposed credentials.

  • Credential Lookout (CL) – Searches for leaked emails in hidden networks, detecting illicit database uploads and breach history of email domains.

  • Combo Binder (CB) – Identifies and analyzes “combo files” (combined leaked credentials) from multiple sources, offering fresh data for defending against credential stuffing attacks.