Ransomware & Dark Web Data Breach Monitor avatar
Ransomware & Dark Web Data Breach Monitor

Pricing

from $3.00 / 1,000 results

Go to Apify Store
Ransomware & Dark Web Data Breach Monitor

Ransomware & Dark Web Data Breach Monitor

Monitor ransomware attacks and data breaches from the dark web. Track ransomware groups like LockBit, BlackCat, Play, and more. Get real-time alerts on victim organizations, leaked data, and cyber threats. Essential for threat intelligence, cybersecurity research, and brand protection.

Pricing

from $3.00 / 1,000 results

Rating

5.0

(1)

Developer

Lofomachines

Lofomachines

Maintained by Community

Actor stats

1

Bookmarked

2

Total users

1

Monthly active users

8 days ago

Last modified

Share

Monitor ransomware attacks and data breaches from the dark web in near real time, using the public ransomware.live dataset in a safe and structured way.

FeaturesUse CasesInputOutputDataset ViewsCost of UsageData Source


This actor fetches and filters data from the Dark Web, giving you a structured view of ransomware group activity, victim organizations, and leak announcements published on dark web data leak sites.

It is built for threat intelligence, cybersecurity, brand protection, and research teams that want to quickly integrate this information into dashboards, analytics pipelines, or SIEM systems.

✨ Key Features

  • 🔍 Bulk Keyword Search: search multiple terms at once (victim names, ransomware groups, descriptions) with case-insensitive matching.
  • 🌍 Country Filtering: filter by country using 2-letter ISO codes (e.g., US, GB, DE, IT).
  • 📅 Date Range Filters: limit results to attacks discovered within a specific time window.
  • Fast & Lightweight: get data in the fastest way.
  • 📊 Structured Output: dataset output with a defined schema, ready for BI tools, dashboards, integrations, and automation.
  • 🛡️ Safe Dark Web Intelligence: no direct access to .onion sites; no Tor system needed.

🎯 Use Cases

Use CaseDescription
Daily Threat MonitoringRun the actor on a schedule to find new attacks mentioning your organization, your domain, or your sector.
Brand & Third‑Party RiskCheck whether vendors, partners, or customers have appeared in ransomware leak sites.
Industry / Vertical ResearchAnalyze ransomware trends in a given vertical (e.g., healthcare, finance, manufacturing) for reports and research.
Geographic AnalysisMonitor attacks targeting specific countries or regions using ISO codes.
Threat Actor TrackingTrack specific campaigns of groups such as LockBit, BlackCat, Play, Akira, and many more.
SOC / SIEM EnrichmentEnrich incidents in your SIEM with context via webhook or API.

📥 Input Configuration

The actor accepts a JSON input with filters for keywords, country, date range, and maximum number of results.

Example Input

{
"keywords": "healthcare\nhospital\nmedical",
"country": "US",
"dateFrom": "2024-01-01",
"maxResults": 500
}

Input Parameters

ParameterTypeRequiredDefaultDescription
keywordsString❌ No""Search terms (one per line, or separated by comma / semicolon). The search runs against victim name, group name, and description. Case-insensitive. Empty = no keyword filter.
countryString❌ No""2-letter ISO country code (e.g., US, GB, DE, IT). Empty = all countries.
dateFromString❌ No""Minimum discovery date for attacks (format YYYY-MM-DD). Empty = no lower bound.
dateToString❌ No""Maximum discovery date for attacks (format YYYY-MM-DD). Empty = no upper bound.
maxResultsInteger❌ No100Maximum number of records to return (min 1, max 10,000). Directly affects run time and CU usage.

📤 Output

The actor produces:

  • A dataset with one item per filtered attack/record.
  • A metadata object saved in the default key‑value store under key OUTPUT (total results, total in database, applied filters).

Output Fields (Dataset)

FieldTypeDescription
post_titleStringName of the victim organization.
group_nameStringRansomware group responsible for the attack.
descriptionStringAdditional context or description of the victim/attack.
websiteStringVictim’s website domain.
countryString2-letter ISO country code.
activityStringIndustry / sector of the victim.
discoveredString (date‑time)When the attack was detected in the dataset.
publishedString (date‑time)When the data was published on the leak site.
post_urlStringOriginal post URL on the leak site.
modificationsArray<Object>History of record updates, if available.

Example Output Item

{
"post_title": "Example Healthcare Inc",
"group_name": "lockbit3",
"description": "Healthcare provider with 500+ employees",
"website": "https://examplehealthcare.com",
"country": "US",
"activity": "Healthcare",
"discovered": "2024-06-15T14:32:10.123456",
"published": "2024-06-14T00:00:00.000000",
"post_url": "http://lockbit...onion/post/...",
"modifications": []
}

OUTPUT key (metadata)

In the default key‑value store, the OUTPUT key contains:

{
"totalResults": 123,
"totalInDatabase": 45678,
"filters": {
"keywords": ["healthcare", "hospital", "medical"],
"country": "US",
"dateFrom": "2024-01-01",
"dateTo": null,
"maxResults": 500
}
}

📊 Dataset Views

This actor defines preconfigured dataset views (see .actor/dataset_schema.json):

  • Overview: compact view for quick analysis, with key fields:
    • post_title (Victim), group_name (Ransomware Group), country, activity, discovered, published, website, post_url.
  • Raw Records: also shows description and modifications for deeper investigation of individual cases.

You can access the dataset from the actor’s Output tab in Apify Console or via API (see the automatically generated link).