IDENTITY INTELLIGENCE

Delve deep into the world’s largest and
most accurate identity datalake.
IDENTITY INTELLIGENCE

Delve deep into the world’s largest and
most accurate identity datalake.
4iQ IDLakeTM
Powering
Adversary Intelligence

The traditional approach to building a virtual wall to protect data cannot be counted on. That’s why hundreds of “secure” networks are compromised every day. By going where black hat hackers buy, sell, trade and dump data, 4iQ provides a layer of protection never before available.

As breach hunting pioneers, the 4iQ intelligence team has spent over ten years developing tools and techniques to both continuously crawl and manually access the surface, deep and dark webs, networks and underground communities.

IDLakeTM
Adversary Intelligence

The traditional approach to building a virtual wall to protect data cannot be counted on. That’s why hundreds of “secure” networks are compromised every day. By going where black hat hackers buy, sell, trade and dump data, 4iQ provides a layer of protection never before available.

As breach hunting pioneers, the 4iQ intelligence team has spent over ten years developing tools and techniques to both continuously crawl and manually access the surface, deep and dark webs, networks and underground communities.

4iQ IDLake

4iQ scans deep and dark web sources for stolen, leaked or lost login credentials and other personal identifiable information (PII).
With team and technology, 4iQ indexes billions of identity records exposed in hacked and dumped breach corpuses across the world.

Quality Data
Massive Volume
Historical & Fresh Data
Robust Platform

4iQ uses team and technology to deduplicate, authenticate and attribute breach data accurately to a source, extracting all possible data and context, then normalizing that intelligence into standardized formats.  Using a strong verification methodology, the 4iQ breach team creates accurate, detailed reports that assess the authenticity, freshness and risk of every breach or leak. 

4iQ has gathered and validated over 100+ Billion breach attributes and 25+ Billion curated records — and growing every day — with a robust set of personal data attributes: emails, passwords, cryptocurrency wallets and addresses, IP Addresses, credit card numbers, cvv codes, IBANs, Social security numbers, birthdates, drivers licenses, passport numbers, and more. 

The 4iQ IDLake contains data from breaches and leaks discovered in open sources from 2005 up until today. With historical data, you can alert people on exposures on accounts they’ve long forgot about. This also helps with pivoting on exposed identity attributes from the past to unmask bad actors. Fresh data allows you to get ahead of threats to consumers and businesses. 

Proven, scalable infrastructure deployed within production customer environments worldwide.  Strong encryption protocols protect data both at rest and in transit both internally and externally. User access permissions leverage role-based access controls. Dynamically supports varying use cases, keeping pace with the every evolving tactics of cyber criminals. 

Quality Data

4iQ uses team and technology to deduplicate, authenticate and attribute breach data accurately to a source, extracting all possible data and context, then normalizing that intelligence into standardized formats.  Using a strong verification methodology, the 4iQ breach team creates accurate, detailed reports that assess the authenticity, freshness and risk of every breach or leak. 

Massive Volume

4iQ has gathered and validated over 100+ Billion breach attributes and 25+ Billion curated records — and growing every day — with a robust set of personal data attributes: emails, passwords, cryptocurrency wallets and addresses, IP Addresses, credit card numbers, cvv codes, IBANs, Social security numbers, birthdates, drivers licenses, passport numbers, and more. 

Historical & Fresh Data

The 4iQ IDLake contains data from breaches and leaks discovered in open sources from 2005 up until today. With historical data, you can alert people on exposures on accounts they’ve long forgot about. This also helps with pivoting on exposed identity attributes from the past to unmask bad actors. Fresh data allows you to get ahead of threats to consumers and businesses. 

Robust Platform

Proven, scalable infrastructure deployed within production customer environments worldwide.  Strong encryption protocols protect data both at rest and in transit both internally and externally. User access permissions leverage role-based access controls. Dynamically supports varying use cases, keeping pace with the every evolving tactics of cyber criminals. 

MOST ACCURATE DATA.
STRONG VERIFICATION METHODOLOGY.

While the number of accumulated raw identity records provides insight into the sheer volume of data points out there, it is not the best indicator of overall risk. This is because not all of the data gathered is authentic or unique. Circulating in the Darknet and mixed in with authentic breach corpuses, are fake breaches and “combo-lists” or mashups of different breach packages.

In addition, attribution is all too often not clear, so it may not be obvious where the data came from and which site was actually breached. Misattribution incidents – like the 2016 event, when a breach attributed to Dropbox was actually from Tumblr – create anxiety for consumers, costly loads on call centers, and potential legal liability for service providers.

The 4iQ breach team has established a strong data verification methodology and curation process and creates accurate, detailed reports that assess the authenticity, freshness, and risk of every breach or leak. 

After we gather the raw data, our next step is to analyze the details. 4iQ has machine learning algorithms that quickly identify real, sensitive data, removes duplicate records, and normalize the information for further analysis.

Then, the breaches undergo a verification process where our analysts and experts use numerous research and investigation methods to ensure that the domain data and other information are real and valid. Once a breach is verified, the 4iQ platform calculates a risk score based on a number of variables such as type of attributes, date, and strength of password.

IDLakeCuration Process

Learn more about our strong data verification and curation processes for accurate intelligence.


IDLake Datasheet