

























"I can only recommend taking this small building block. It is easy to implement, quick, and absolutely economical. You can sum it up nicely as act instead of react."
Martin Chroust, Alois Dallmayr KG
Head of IT
"In recent years, we have observed a tremendous increase in criminal activities via the darknet. Corporate IT absolutely needs to be aware of this to protect itself proactively. The Blackveil service fits seamlessly into an existing IT security concept."
Sebastion Rauh, Dr. Pfleger Pharmaceuticals
Head of IT
While others only react, you protect your company proactively—detect threats with our Dark Web Monitoring before they strike.
Book Free Dark Web AnalysisIn this phase, cybercriminals deliberately gather information about their target—through vulnerability analysis, scanning the network infrastructure, or identifying employees. This is precisely where Blackveil Cyber Security intervenes—before the attack can escalate further.
Our tools, your protection:
Your advantage: Instead of reacting to attacks, Blackveil helps you act proactively during the first phase. You stay one step ahead of threats and protect your sensitive data effectively and sustainably.
Blackveil Cyber Security — Because prevention is the best defense.
Book Free Dark Web Analysis
The attacker develops or acquires the necessary tools, such as exploits or malware, and may use data leaked on the dark web to prepare a targeted attack tactic.
The malicious payload is delivered to the target via various attack methods, e.g., phishing emails, drive-by downloads, or compromised websites. These methods ensure the malware reaches the target directly.
In this phase, the malware becomes active on the target system by exploiting security gaps to gain access and execute initial actions.
The malware installs itself and establishes a persistent presence on the system, allowing attackers to access it at any time.
Attackers establish control over the infected system and can exfiltrate data or perform further actions such as downloading additional malware.
Our Dark Web Monitoring service is based on the most comprehensive darknet data commercially available.
Data Leak Records
Tor Documents
L2P Documents
ZeroNet Documents
records from Telegram Channels
records from Discord Servers
Marcus Henschel, Blackveil Cyber Security
Book Free Dark Web AnalysisBlackveil enables companies to model risks, understand their weaknesses, and anticipate potential cyber incidents. With this module, companies can take proactive measures early to protect against and prevent a successful cyberattack.
Book Free Dark Web AnalysisMarcus Henschel, Blackveil Cyber Security
Book Free Dark Web AnalysisSave up to 20% with annual payment!
Managed Dark Web Monitoring Service
Email Monitoring (1 domain)
Website monitoring (1 website)
IP Address Monitoring
(4 IP addresses)
Alerting for critical incidents
Cloud login monitoring
Stealer malware (infostealer) &
botnet tracking
Hacker discussions monitoring
Black market monitoring
Telegram & Discord channel
monitoring
Basic support via email
Annual report
Managed Dark Web Monitoring Service
Everything in Starter
Email Monitoring (3 domains)
Website monitoring (3 websites)
IP Address Monitoring
(8 IP addresses)
Brand mentions monitoring
Credit Card Monitoring
(up to 5 credit cards)
Typosquatting monitoring
C-level digital monitoring
Attack Anticipation module
Incident assessment
& Alerting
Monthly report
Executive Annual Threat Report
Everything in Professional
Due Diligence Monitoring
Third-party monitoring
(1 Company)
Email Monitoring (5 domains)
Website monitoring (5 websites)
IP Address Monitoring
(16 IP addresses)
Quarterly one-on-one
expert session
Incident assessment
& Alerting
Monthly report
Executive Annual Threat Report
Exclusive security webinars
Advanced integrations & extended data access
Price for Starter & Professional
Included in Premium package
API & Webhook integration
Direct access to all data via the Blackveil API
Integration with SIEM, SOAR & log management systems
Push-based webhook model with no API limits
Secure token-based & IP-based authentication
Strengthen your organization’s security by protecting your employees’ private digital identities.
This module can be flexibly added to your existing monitoring — regardless of your package.
Automated checks of private email addresses against known data breaches
Detection of compromised credentials in dark web & leak sources
Continuous monitoring throughout the entire contract period
CSV import with syntax validation & duplicate detection
Alerts with risk classification when exposures are found
* plus one-time setup fee (EUR 390.00)
Book a free consultation appointment here.
Request your Blackveil Cyber Security service without obligation.
Blackveil’s Dark Web Monitoring enables organizations to detect compromised or stolen data at an early stage — before it can be abused in cyber attacks.
Blackveil continuously scans hard-to-reach areas of the internet, including the Dark Web, underground forums, data marketplaces and leak databases for any information related to your organization.
This includes stolen credentials, passwords, credit card data, IP addresses and domains. Once a relevant finding is verified, you receive an alert including a risk assessment and concrete recommended actions.
To ensure maximum timeliness, Blackveil performs a complete scan of all relevant sources on a daily basis.
Nearly every day new leaks, data dumps and information sources are ingested and analyzed.
This allows you to react to emerging threats quickly — often within hours after a new dataset becomes available.
Just a few years ago, systematically identifying and analyzing data from the Dark Web was nearly impossible:
- Access to the Dark Web was technically complex and time-consuming.
- Thousands of fragmented sources constantly change and are nearly impossible to review manually.
- Comprehensive indexing and correlation of data was not feasible.
- As a result, recognizing attack patterns or predicting upcoming attacks was extremely difficult.
Today, Blackveil closes this gap using specialized technologies, API partnerships and proprietary analysis methods — transforming fragmented information into a clear, actionable security picture.
Yes — on request and strictly on a voluntary basis. Organizations may submit a list of employees who have explicitly consented to monitoring their private email addresses. This monitoring helps prevent identity theft and credential leaks that could later be exploited to attack corporate systems.
Important safeguards:
- Only email addresses and consent metadata (timestamp, method, status) are processed.
- No mailbox contents or personal data are accessed or stored.
- All data is transmitted encrypted and stored in EU data centers in compliance with GDPR.
- Consent can be revoked at any time; affected addresses are immediately removed from monitoring.
This makes private email monitoring a powerful extension of corporate security — without compromising employee privacy.
As soon as a finding is identified and verified, you are notified immediately. Each hit is manually reviewed by analysts to assess relevance, freshness and severity — including whether passwords are stored in plaintext or encrypted and which source the dataset originates from. You receive prioritized action recommendations to mitigate risks quickly and effectively.
Every finding is technically and contextually reviewed before being shared with the customer. Our goal is to deliver only relevant, verified and actionable intelligence. The response process follows a clearly defined workflow:
1. Criticality assessment — evaluating source, severity and recency.
2. Secure delivery — via portal or alternative secure channels.
3. Internal notification — alerting IT teams or service providers.
4. Internal system review — analyzing logs and activities for potential compromise.
5. Employee awareness — raising alert levels for phishing, calls and social engineering.
Upon request, Blackveil supports you throughout every phase — from technical assessment to crisis communication.
Blackveil integrates seamlessly into existing security environments. Via the Blackveil API, all relevant monitoring data — including leaks, threat indicators and risk scores — can be directly ingested into your systems. This enables SIEM platforms, Security Operations Centers (SOC) and Managed Security Providers (MSP) to automatically consume live threat intelligence. Blackveil becomes a proactive, automated data source within your security architecture — without additional tools or manual processes.
The Blackveil Starter Package begins at €200 per month and already includes extensive monitoring capabilities. Monitoring of private email addresses is available as an add-on and priced based on the number of monitored addresses.
There is no free trial. However, upon request, Blackveil provides an individual Blackveil Report. This report contains all publicly identifiable findings from the last 24 months for your domain(s), including an objective risk analysis and scoring. It gives you a realistic overview of your current exposure — without requiring active integration or contractual commitment.
All Blackveil packages leverage the same high-quality data sources. Data quality is identical across all packages — regardless of price. Differences only exist in functional scope, analytical depth and additional services.
Starter:
Monitoring of one domain, one website and up to four IP addresses. Includes email, cloud login and stealer/botnet monitoring with automated alerts for critical findings.
Professional:
Extended coverage with multiple domains, websites and IP addresses. Additional features include brand mention monitoring, credit card monitoring (up to five cards), typosquatting detection, C-level monitoring and the Attack Anticipation Module for early attack preparation detection. Starting with Professional, customers also receive a monthly risk report summarizing all findings from the previous month and providing an up-to-date Blackveil risk score.
Premium:
Comprehensive monitoring including due diligence and third-party monitoring. Covers up to five domains, five websites and 16 IPs, plus regular expert briefings, quarterly security consultations and exclusive webinars.
Over 60% of cyber attacks originate from already known but undetected vulnerabilities (source: Verizon DBIR / BSI). Traditional security solutions often detect threats only after they have entered the internal network. Blackveil closes this gap. Our technology identifies indicators of planned or ongoing attacks already during the preparation phase — when data is being traded, domains are being imitated or credentials are exchanged.
Blackveil enables organizations to detect potential cyber attacks up to four months before they occur and take proactive action.
Blackveil follows strict data minimization and purpose limitation principles: only information required for monitoring is processed. All data is encrypted in transit and at rest. Access is strictly role-based. Processing is performed in certified EU data centers and fully GDPR-compliant. Upon request, Blackveil provides a Data Processing Agreement (DPA) and supports data protection impact assessments (DPIA).
Our security architecture follows a layered defense approach that minimizes exposure risk at every level:
1. Source Reality — the analyzed data is already publicly available.
2. Access Containment — the portal is not publicly accessible and protected by MFA.
3. Least Privilege & API Design — API keys with limited permissions and regular rotation.
4. Encryption & Data Handling — TLS transport, encryption, hashing and tokenization.
Even in the highly unlikely event of a cyber incident, potential damage would be minimal.
Typosquatting refers to the deliberate registration of domains that closely resemble legitimate company domains — through misspellings, number substitutions or alternative spellings (e.g. micros0ft.com instead of microsoft.com). Attackers use these domains for phishing campaigns, social engineering and fake login pages. Even minor deviations can deceive recipients. Blackveil automatically detects such imitation attempts and alerts you early — before they are actively abused.