Dark Web

Adding Dark Web Search Terms

Bolster’s Dark Web module monitors specific terms you define to surface threats such as stolen credentials, leaked code, or phishing kits. This guide shows you how to set up those search terms for accurate findings.

A search term consists of up to three elements:

1. Entity – Type of information to look for (optional)
2. Category – Types of dark web posts to look in (optional)
3. Value – Keyword or keywords that the search needs to match (required)

Steps to Add a Search Term

Here’s how to add a search term to the Dark Web module for Bolster to monitor.

1. Navigate to Attack Surface > Dark Web > Add Search Terms.
2. Under Search Terms, use the dropdowns to define the three elements:

  • Monitor results in select category
  • that includes select entity
  • with value enter value

3. Select Submit to create the search.
4. Verify that it appears in the Searches list. At first, Last Search will say In Progress.

Example

If you wanted to look for:

  • The credit card number 1111 2222 3333 4444
  • Only in posts containing breach data for sale
  • Excluding those same digits if they’re found in other contexts

Then you’d make the following Search Terms dropdown selections:

  • Monitor results in Breach Data for Sale
  • that includes Credit Card
  • with value 1111 2222 3333 4444

For more examples covering full workflows for common use cases, see Setting Up Dark Web Detection Workflows.

Search Term Guidelines

To get useful results, your search terms should match the kind of dark web data you’re looking for. This helps ensure complete and relevant findings, giving you comprehensive protection and making triage easier.

Here are guidelines for building successful dark web searches.

Categories

Category narrows your search to a specific type of dark web content, such as posts selling breach data or malware. Select Any to search across all types.

For example, if your search focuses on finding potentially damaging information about company executives, choose the Employee Monitoring category to search only posts that talk about employee names.

Category Dark Web Content Type
Breach Data for Sale Posts selling data from breaches and leaks.
Employee Monitoring Posts referencing employee names.
Hacker Chatter Conversations that appear to have hostile intent.
IP Leak Data for Sale Posts selling leaked intellectual property (like source code).
Malware for Sale Posts offering malware for sale.
Phishing Kits for Sale Posts selling kits to help hackers impersonate your brand.
Ransomware for Sale Posts offering ransomware for sale.

Entities

Entity refers to the type of information the value represents.

Entity narrows your search to a specific type of information, such as an email address. Select Any to search across all types.

For example, if your search uses the Email-Domain entity, the value must be an email address in the expected format (e.g., identifier@domain.com).

Entity Matching Value Format
Credit Card Complete or partial BIN or credit card number. Dashes or other punctuation are disregarded.
Crypto Address Crypto wallet type. Valid values are:
  • Bitcoin
  • Ethereum
  • Litecoin
  • Monero
  • Dash
  • Zcash
Email Address Email address (example: identity@domain.com).
Customer-Email-Domain Domain name (example: domain.com) as part of an email address (anything@domain.com).
Employee-Email-Domain Domain name (example: domain.com) as part of an email address (anything@domain.com).
IP Address Single IP address (example: 192.1.67.0.5) or a subnet in CIDR notation (example: 192.1.68.0.0/24).
SSN Complete or partial United States Social Security number. Dashes or other punctuation are disregarded.

Values

The keyword value is the most important part—it’s the exact text Bolster will look for on the dark web. So craft your value carefully to surface relevant results without too much noise. You can use Boolean operators like AND and OR (must be all caps) for precision.

Operator Function Example
Double quotation marks “” March an exact sequence of keywords “Jim Smith”
AND Match content containing multiple keywords drugs AND crime
OR Match content containing any of multiple keywords drugs OR crime
Double parentheses () Specify a list of options Bolster AND (hack OR ddos OR 0day)

More Examples

Here are a few sample search terms to show how values work in different contexts. You’ll see what gets returned (and what doesn’t) based on the combinations you use.

Category Entity Value Returns Doesn’t Return
Any Email Domain bolster.ai Posts containing tom@bolster.ai Posts containing bolster.ai/docs because it’s not in an email format
Hacker Chatter Any bolster.ai Hacker posts containing tom@bolster.ai and/or bolster.ai/docs Breach data for sale containing tom@bolster.ai and/or bolster.ai/docs, because it’s not found in hacker conversations
Phishing Kits Any bolster.ai OR bolster.com Phishing kit posts containing either bolster.ai or bolster.com Hacker chatter containing either bolster.ai or bolster.com, because it’s not in a post selling phish kits
Phishing Kits Any bolster.ai AND bolster.com Phishing kit posts containing both bolster.ai and bolster.com Phishing kit posts containing only bolster.ai, because both keywords aren’t there

Refining Search Terms

To improve relevance and reduce noise, your Customer Success Manager or Bolster support contact can review your planned search terms and suggest refinements based on best practices.