Traces invisible to the SOC
Credentials stolen by infostealers, IAB access listings, brands discussed in forums leave no logs on the customer's systems — they are outside the perimeter.
Criminal marketplaces, ransomware leak sites, Telegram channels, underground forums, infostealer log dumps. Most threats have an echo in criminal channels before they reach the SOC. Fortgale listens continuously: 24/7 surveillance, real-time alerts, actor context. 50+ ransomware leak sites, 300+ Telegram channels, dozens of underground forums and infostealer log dumps indexed by customer domain.
Most ransomware incidents are preceded by weeks of traces in criminal channels: credentials for sale, IAB access listings, brands discussed on forums. Without underground monitoring, these traces stay invisible to the SOC.
Credentials stolen by infostealers, IAB access listings, brands discussed in forums leave no logs on the customer's systems — they are outside the perimeter.
By the time data hits the leak site, the damage is done. Only monitoring lets you know earlier — during countdown or negotiation.
A compromised critical supplier can become the attack vector. Extended tracking to supplier domains = pre-warning on the supply chain.
The difference is not "how many sites you scan", it is how varied, how often and with what context. Monitoring without correlation and analyst follow-up only produces noise.
Four documented phases · from source discovery to the delivery of an alert with context.
Continuous mapping of relevant criminal sources: active ransomware leak sites (50+), Tor/I2P marketplaces, Telegram channels of kit sellers and IABs, underground forums (Exploit, XSS, BreachForums successors), paste sites (Pastebin, RentryCo). The source database is constantly updated.
24/7 automated surveillance combined with Fortgale OSINT analysts for sources that require human interaction (invite-only forums, private channels). Coverage of Tor, I2P, Freenet, dark web shops, Telegram, underground forums, paste sites, crypto channels.
Every event is validated (no false positives), correlated with the customer's assets and brand (domains, corporate emails, executives, IP ranges, products), enriched with context on the originating actor (ransomware group, IAB, MaaS operator, motivation).
Immediate alert via webhook (Slack, Teams, Discord), email, SMS. For critical events (leak site exposure, admin credentials, compromised executives), a Fortgale analyst gets back within 30 minutes for operational support (containment, reset, take-down).
The five families of criminal sources Fortgale monitors continuously. Each family has its own dynamics, its own timing, its own patterns.
Continuous tracking of the leak sites of the main ransomware groups. Every newly announced victim is indexed, correlated with Fortgale customers and with their supply chains. Pre-leak alert when a customer or supplier domain appears in countdown.
Continuous coverage of the marketplaces where initial access (IAB), credentials, exfiltrated data, exploits and malware are sold. Automatic indexing by customer domain, IP range, products, executives.
Acquisition and indexing of infostealer logs for sale. Infostealers steal credentials, cookies, session tokens, crypto wallets, autofill data from victims' browsers. Logs end up for sale on marketplaces, Telegram and forums. Fortgale acquires, indexes by customer domain, alerts in real time.
Monitoring of historic criminal forums (Exploit, XSS) and post-takedown successors of BreachForums/RaidForums. Coverage of technical discussions, access sales, attack planning, recruitment.
Telegram is today the preferred communication channel of Russian-speaking and European cybercrime. Coverage of 300+ channels across kit sellers, ransom announcements (alternative to leak sites), IAB markets, combo list dumps, hacktivist channels.
A selection of the criminal sources most relevant to European customers. It changes continuously: every month new leak sites emerge, others disappear due to takedowns or exit scams.
Continuous tracking of the LockBit leak site following Operation Cronos in 2024. The group has reconstituted with renewed leak site and affiliate program. Fortgale monitors new victims, countdowns and indexes published data for customer assets.
Top group 2024-2026. Tracking of the RansomHub leak site, announced victims (manufacturing, healthcare, public administration), exfiltration patterns and correlation with your suppliers' customers.
Lumma Stealer is the top infostealer 2024-2026. Stolen logs are sold on Russian Market, Telegram and BreachForums. Fortgale indexes logs by customer domain and alerts in real time.
Marketplace #1 for stolen logs following the Genesis Market takedown. Real-time tracking of new listings by customer domain. Distinct fingerprint on the main sellers' patterns.
Following the 2023-2024 takedowns, BreachForums has had numerous clones and successors. Tracking of the main ones (some invite-only) with Fortgale OSINT analysts.
Telegram is the preferred channel for phishing kit sales. Tracking of Tycoon 2FA, Mamba 2FA, EvilProxy, W3LL channels. Coverage of new versions, pricing, support channels.
Forums and channels where compromised initial access is sold (RDP, VPN, Citrix, SSH). Real-time tracking, correlation with the customer's sector for pre-warning.
Every event receives an explicit severity level (Critical/High/Medium/Info) that determines the alert channel. No raw list, no alert fatigue.
Active leak site exposure, compromised admin credentials, executive on victim list, sensitive data for sale. Immediate alert + analyst follow-up within 30 min.
Compromised standard user credentials, company mention in a criminal forum, active look-alike domain registration. Webhook alert within 15 min.
Mention in the weekly digest, historical listing no longer active, low-value data. Included in the weekly digest.
Informational mention, mention in a low-value channel, general context. Available in the dashboard, does not generate an alert.
Four distribution channels, chosen based on role (CISO, SOC, IR, board) and event criticality.
Fortgale web console with a real-time view of detected events: leak sites, marketplace listings, infostealer log dumps, forum mentions. Filtering by source, severity, asset involved.
Immediate push of critical alerts via webhook (Slack, Teams, Discord), email, SMS. SLA < 15 minutes from detection for critical/high events.
Weekly report via email for the CISO with statistical summary: event volume, top sources, top actors, focus on events that require management decisions.
On-demand deep dive into specific events by Fortgale analysts: actor context, containment support, coordination with incident response.
Deep & dark web monitoring is only worth it if the organisation has online exposure: visible brand, executives with a public profile, e-commerce, critical assets exposed to the internet, ransomware target sector (manufacturing, healthcare, energy, finance, public administration).
If the organisation is B2B niche, with no public brand, no e-commerce, no visible executives — the value of alerts is low. In that case a standard STIX/TAXII feed (capability 02) or vertical advisories (capability 03) produce more value.
Not sure? Let's talk. If you don't need it, we'll tell you.
Monitoring events feed detection, intelligence and governance · they do not stay in an isolated report.
When an exposed infostealer log includes corporate credentials, the SOC receives a priority alert to disable the session and force a reset.
Discover the SOC →When a domain appears in countdown on a leak site, the IR team is activated preventively for containment.
Contact IR →Dark web traces feed actor profiles — who is hitting what, how, how often.
Discover TA Profiling →Threat Actor Profiling · TI Feed · Advisory · Executive Briefing · ASM · Brand Intelligence. Monitoring is capability 05 of 7.
See all →Dark web monitoring produces data the board cannot obtain otherwise. Three slides to surface the relevance.
How many events detected in the last 6 months · how many credentials exposed · how many executives mentioned · how many suppliers on leak sites.
Who is hitting your sector (ransomware groups, IABs, infostealers) · how many indirect recurrences (via suppliers, former employees) you have.
How many incidents avoided thanks to pre-warning (credentials reset · domains blocked · executives contacted for coaching) · estimated avoided cost.
The "3-slide board pack" is available as a PDF · can be requested separately.
It means continuous surveillance of criminal sources not accessible from search engines: Tor marketplaces, ransomware leak sites, underground forums, Telegram channels of kit sellers and IABs, infostealer log dumps for sale, paste sites. Fortgale monitors more than 50 active ransomware leak sites plus dozens of marketplaces and hundreds of Telegram channels, with 24/7 automated coverage and analyst OSINT.
All top groups active in 2024-2026: LockBit (post-Cronos), RansomHub, Akira, Medusa, Cl0p, BlackBasta, Play, INC, Hunters International, Qilin, and 40+ other minor groups. Tracking of leak announcements, published data, negotiation channels, victim recurrences in the customer's sector.
Infostealers (Lumma, RedLine, Vidar, StealC) steal credentials, cookies and session tokens that end up for sale on Russian Market, Telegram channels and BreachForums successors. Fortgale acquires marketplace logs, indexes by customer domain and alerts in real time when corporate credentials or compromised assets appear.
Standard services run periodic scans of a few known sources. Fortgale offers continuous coverage of 50+ leak sites, 300+ Telegram channels, dozens of underground forums, Tor/I2P marketplaces and infostealer log dumps, with automatic correlation against the customer's inventory and actor context. Not a raw report: a qualified alert with the required action.
For leak site exposure and high-privilege credentials: real-time webhook alert within 5-15 minutes from detection. For critical events (Critical severity), a Fortgale analyst calls or writes within 30 minutes. For informational events, daily or weekly digest at the customer's discretion.
If the organisation has no online brand visibility, no critical assets exposed to the internet, no executives with a public profile, no e-commerce and is not in a ransomware target sector. In those cases the value of alerts is low. If, however, the brand is visible and the sector is targeted, monitoring is one of the most cost-efficient ways to intercept attacks before the active phase.
Request a free 30-day scan · 5 domains, 10 executives, brand keywords. We return a report with real events detected in criminal channels · no commitment.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.