Shadow

For cybersecurity sales teams and MSSPsvulnerability research and identification tool

The new favorite of SOC teams: Powered by Dark Radar's cybercrime database, Shadow is designed for cybersecurity teams and MSSPs. It transforms Infostealer-based vulnerabilities into powerful results within seconds using country, IP, HWID or sensitive credential filters.
"An impressive and sharp experience that significantly reduces time costs in investigations."
...

Total at-risk domains

...

Total infected machines

Shadow Hunter

Exclusive to MSSPs

Credit Transactions
1 Credit = $0.50

* Advanced case investigation and customer acquisition tool for MSSP and SOC teams. Instantly detect your customers' vulnerabilities with the DarkRadar database, prepare detailed reports, and grow your cybersecurity services by offering comprehensive security assessments to potential customers.

Search
0 kr
$0.00
Metadata Preview
1 kr
$0.50
Leak Lock
5 kr
$2.50
File Download
10 kr
$5-10
API Alert
1 kr
$0.50
Full Vulnerability Report
20 kr
$10
Included Features
Domain/Subdomain Based Search
IP Address Based Search
Email and Username Based Search
Country Based Search
Metadata and File Preview
Detailed Vulnerability Reporting
API Alert Integration
Client-Specific Demo Reports
Flexible Credit Management

These packages may be used by institutions/individuals that are officially operating in the relevant country, possess legal entity status, and can document that they provide services in the field of cybersecurity. The use of the tools is restricted based on compliance with applicable national and international legislation.

Eligible User Profiles
CSCCybersecurity Companies
MSSPManaged Security Service Providers
SOCCorporate Security Operations Teams/Personnel
CIPCyber Insurance and Risk Assessment Providers

Requests for academic, experimental, or research-oriented use are not granted direct access. However, individuals and institutions meeting the following criteria may be included in a manual evaluation process:

  • Employed within a corporate SOC structure
  • Authorized security researcher (white-hat)
  • Able to document the justification for use within the scope of defense, threat intelligence, or risk analysis

All access is granted within the framework of contracts and policies in which the purpose of use, scope of authorization, and legal responsibilities are clearly defined. All legal, administrative, and criminal liabilities arising from any actions performed during the use of the tool rest entirely with the user institution.

The platform provider cannot be held responsible for unauthorized, unlawful, or abusive activities.

Why Shadow?

Protect your organization proactively. Integrate, monitor, and respond to compromised accounts in real-time with automated identity threat response system.
  • Reduces query time by 99%

    Long log scans, manual correlation and waiting become history.

  • Direct access to root cause

    Instant answers to "Where did this leak come from, what did it steal, which machine did it start with?"

  • Forensic pivot from a single screen

    IP > HWID > user > email > session > malicious file; open the entire relationship network with a single click.

darkradar Logo

Shadow for SOC & MSSP Teams

Discover the advantages Shadow offers for SOC and MSSP teams.

Quick Features

Advantages that SOC and MSSP teams gain with Shadow

Extensive filter set

Country, IP, HWID, email, username, machine name, technology/port, operating system, time range, leak date.

Compromise counter

Shows how many times a machine has experienced leaks to date.

Geographic and density map

Which country, which region has density — prioritization instantly.

Raw artifact access

Quickly download the relevant vulnerable file, log snippet or stolen credential data samples.

API & integration

Easy integration with SIEM, SOAR and ticketing systems.

Reporting & export

Forensic report, IOC list and CSV/JSON export.

Integration with Shadow

Discovery-Focused Threat Intelligence with Shadow

Shadow, running on the DarkRadar platform, is a discovery tool focused on identifying brands and digital assets that carry potential risk through data compromised by InfoStealer malware. For cybersecurity firms, MSSPs and security professionals, Shadow is a powerful and action-oriented analysis tool that identifies organizations that are candidates for Beacon usage at an early stage while providing context to cybersecurity teams about what detected vulnerabilities are, what they mean and how they should be interpreted.

Easy integration with RESTful API
Compatibility with SIEM solutions
Real-time webhook support
SSO authentication
[BR]84B0415EF1910CC058EAE0039562018F
{
"meta":
,
"threat_type":"Infostealer",
"malware_family":"RedLine"
"cookies":
,
"session_id":"abc123",
"auth_token":"xyz789"
"credentials":
,
"url":"https://example.com/path",
"username":"john_doe",
"password":"secure123"
"ip":"192.168.1.100",
"hwid":"84B0415EF1910CC058EAE0039562018F",
"country":"TR",
"malware_path":"C:\Users\John\AppData\Roaming\bad_stealer\stealer.exe",
"date":"2022-04-12T12:46:30",
"os":"Windows 10 Pro",
"computer_name":"JOHN-PC",
"antiviruses":"Windows Defender, Malwarebytes"
}

Infostealer Data Range

Cookies

Allows attackers to use victims' existing sessions by importing cookies and bypass 2FA and other security measures.

Credentials

The URL accessed by the victim, login credentials and plaintext passwords are used by attackers to take over employee and user accounts.

IP

IP address of the compromised computer.

Malware Path

File path where the Infostealer malware was installed on the computer.

Date

The date when the computer was infected.

Operating System

Operating system installed on the infected computer.

Computer Name

Username of the infected computer, helps identify which computer was affected.

Installed Antiviruses

List of antiviruses running on the computer at the time of infection.

Frequently Asked Questions

Get answers to frequently asked questions about Dark Radar's cyber security intelligence platform, infostealer tracking and protection services against credential theft.

Dark Radar Shadow is a threat intelligence platform designed to perform deep analysis of data leaks originating from infostealer malware, discover external threat surfaces, and establish technical correlations between organizations and customer assets. Shadow is not a defensive or prevention tool; it is built for SOC teams to conduct incident investigations, MSSPs to perform customer scanning, and security professionals to generate operational threat intelligence. The platform is focused on technical analysis and reporting.