Ethredix Ethredix
CS

Credential Intelligence

Continuous monitoring of your organization's credential leaks in breach databases and dark web.

Breach Monitoring

Tracking new data breaches and immediate alerts on your credential leaks.

Dark Web Scanning

Searching for your data on dark web marketplaces and hacker forums.

Actionable Alerts

Specific recommendations for immediate response to discovered leaks.

What We Monitor

Corporate Emails

Monitoring all emails with your domain in public breach databases - HaveIBeenPwned, DeHashed, BreachDirectory.

Domain-wide monitoring, executive tracking, compromised accounts

Cleartext Passwords

Identifying accounts where passwords leaked in readable form and pose immediate risk.

Password reuse analysis, credential stuffing risk

VPN and API Keys

Searching for compromised VPN credentials, API keys and service accounts.

AWS keys, Azure tokens, GitHub PATs, database credentials

Dark Web Mentions

Tracking mentions of your company on dark web forums, marketplaces and paste sites.

RaidForums, BreachForums, Exploit.in, Russian forums

Stealer Logs

Monitoring infostealer malware dumps (RedLine, Raccoon, Vidar) for your domains.

Browser passwords, cookies, autofill data, crypto wallets

Session Cookies

Detection of leaked session cookies that can be used for account takeover.

Active sessions, authentication bypass, token hijacking

Reporting and Alerts

Immediate Notifications

  • → Email alerts on new findings
  • → Slack/Teams integration
  • → Critical vs. Medium priority
  • → Deduplication of known findings

Monthly Reporting

  • → Executive summary
  • → Trend analysis
  • → Top affected users
  • → Remediation status tracking

Dashboard Access

  • → Real-time findings overview
  • → Filters by severity/type
  • → Historical data
  • → Export to CSV/JSON

Remediation Guidance

  • → Specific steps for each finding
  • → Password reset playbooks
  • → MFA enforcement recommendations

Use Cases

Credential Stuffing Prevention

Identifying employees using same passwords across multiple services and are at risk of credential stuffing attacks.

Executive Protection

Priority monitoring of VIP accounts (CEO, CFO, IT admins) for immediate response to compromise.

Third-party Risk

Monitoring vendors and partners who have access to your systems.

Process

01

Onboarding

Defining monitored domains, VIP user emails and notification integration.

02

Initial Scan

Initial scan of all known breach databases for baseline findings.

03

Continuous Monitoring

Automatic tracking of new breaches and immediate notifications on new findings.

04

Remediation Tracking

Tracking which findings have been remediated (password reset, MFA enabled).

05

Quarterly Review

Quarterly consultation with trends, top affected users and recommendations for security posture improvement.