Fortinet black logo

User Guide

Viewing leaked compromised systems

Viewing leaked compromised systems

The Adversary Centric Intelligence > Stealer Infections > Compromised Systems(Leaked) page displays information about possible infected systems that are affiliated with your employees or end-users that has been shared over Darknet forums, Telegram channels, Tor sites or any other medium where the threat actor operates.

To view leaked compromised systems information:
  1. Go to Adversary Centric Intelligence > Stealer Infections > Compromised Systems(Leaked).
  2. Use the following widgets to review information about leaked compromised systems:

    Total Compromised Systems(Leaked) affiliated with <organization name>

    Displays the total number of compromised systems leaked affiliated with your organization.

    The calendar displays a summary of the leaked stealer events in the selected calendar year.

    Colored blocked indicate a stealer event. Light colors blocks indicate few affected credentials, and dark colored blocks indicate many affected credentials.

    Hover your mouse over each block to view the discovery date and the number of affected credentials.

    Compromised Systems

    Displays the total number of compromised systems including affected employees and end-users count.

    No of Stealers Found

    Displays the number of stealers found and the names of the stealers.

    Latest Record

    Displays the latest number of stealer events and the date that the event was discovered.

    Employee

    Displays a list of affected employees information.

    Users

    Displays a list of affected end-users information.

The values in all widgets are updated based on the filters applied, except for Total Compromised Systems(Leaked) affiliated with <organization name> value.

Viewing leaked compromised systems

The Adversary Centric Intelligence > Stealer Infections > Compromised Systems(Leaked) page displays information about possible infected systems that are affiliated with your employees or end-users that has been shared over Darknet forums, Telegram channels, Tor sites or any other medium where the threat actor operates.

To view leaked compromised systems information:
  1. Go to Adversary Centric Intelligence > Stealer Infections > Compromised Systems(Leaked).
  2. Use the following widgets to review information about leaked compromised systems:

    Total Compromised Systems(Leaked) affiliated with <organization name>

    Displays the total number of compromised systems leaked affiliated with your organization.

    The calendar displays a summary of the leaked stealer events in the selected calendar year.

    Colored blocked indicate a stealer event. Light colors blocks indicate few affected credentials, and dark colored blocks indicate many affected credentials.

    Hover your mouse over each block to view the discovery date and the number of affected credentials.

    Compromised Systems

    Displays the total number of compromised systems including affected employees and end-users count.

    No of Stealers Found

    Displays the number of stealers found and the names of the stealers.

    Latest Record

    Displays the latest number of stealer events and the date that the event was discovered.

    Employee

    Displays a list of affected employees information.

    Users

    Displays a list of affected end-users information.

The values in all widgets are updated based on the filters applied, except for Total Compromised Systems(Leaked) affiliated with <organization name> value.