The market for dark web monitoring is saturated, and the question is reasonable: does it actually do what it claims, and is the subscription worth paying for? With Google announcing in December 2025 that it would shut down its consumer Dark Web Report in February 2026, removing one of the few free, integrated options tied to a major email account, more people are weighing whether to switch to a paid alternative or do nothing.
The practitioner answer is narrower than the marketing suggests. Dark web monitoring is useful as a tripwire for credentials and identifiers that have already surfaced in known breach datasets, paste sites, and a limited set of indexed criminal forums. It is not a closed-loop control. It does not see live infostealer infections in their first hours, the active resale of session cookies in private Telegram channels, or most of the stealer log economy as it actually trades. For consumers with strong password hygiene and multi-factor authentication, a bundled tripwire is a reasonable belt-and-braces signal. For executives, board members, journalists, and organisations with privileged access, monitoring without infostealer-grade coverage is a false sense of safety.
This article walks through what the technology actually scans, where it has structural blind spots, how the vendor landscape splits between consumer tripwires and SOC-grade intelligence, and when paying for monitoring stops being sufficient on its own. For background on how credential leaks propagate, our credential leaks hub sits one level up from this guide.
Google's exit and why people are asking now
Google announced on 15 December 2025 that the consumer Dark Web Report would be discontinued. Scans for new dark web exposures stopped on 15 January 2026. The feature became unavailable on 16 February 2026, at which point profile data associated with the report was deleted from Google's servers. Google's own framing was that user feedback indicated the report did not provide sufficiently actionable next steps, and that future investment would shift to other security tools such as Security Checkup, passkeys, Password Checkup, and the Password Manager.
For users in the markets where the report had been rolled out, this removes one of the few provider-operated monitoring options that were free, integrated, and tied directly to a major email account. The alternatives now fall into three categories: bundled monitoring inside identity, credit, or antivirus products; standalone consumer subscriptions; and human-led investigation services that look across breach data, stealer logs, and open-source traces. None of these inherits the convenience of a free monitor sitting inside an account dashboard. The market vacuum is one reason this question has gained volume in recent months.
What dark web monitoring actually scans
Most monitoring products, consumer or enterprise, draw from three source categories: historical breach databases, paste sites and public dumps, and a limited set of indexed forums or marketplaces. These are layers where credentials and identity attributes have already been packaged, shared, or sold at least once.
Breach databases are the foundation. Vendors aggregate credentials and identity fields from published breaches and credential-stuffing combo lists. Some platforms add proprietary collections recaptured from criminal sources, but the core operation is the same: take your identifiers, normalise them, and compare against a large pool of known-leaked data. When a match is found, an alert is generated with the source, the data type exposed, and a recommended response.
Paste sites and public dumps are the next ring out. These are where actors test data, advertise breaches, or share smaller leaks. Vendors poll these locations for identifiers. Many also crawl semi-public or invite-only forums where access is achievable and data is exchanged in volume. For business platforms, these alerts integrate into SIEM or SOAR systems so detection can trigger playbooks: enforce password resets, invalidate tokens, open incident tickets.
That covers the layer of the criminal economy where data has already been packaged for distribution. It does not cover the layer where compromised data first arrives.
The stealer log economy: what monitoring rarely catches in time
Infostealer malware harvests browser-stored credentials, session cookies, autofill data, and stored files from infected devices, packages them into archived "logs," and exfiltrates them in bulk to operator-controlled channels. The European Union Agency for Cybersecurity (ENISA) reported in its 2025 Threat Landscape that infostealers, ransomware, and banking trojans together accounted for 87.3% of intrusions in the period studied (July 2024 to June 2025). The infostealer family map has moved repeatedly under law-enforcement pressure: Operation Magnus dismantled RedLine and META in October 2024, after which Lumma rose to dominance with a more than 350% increase in activity per ENISA. Microsoft and partners then disrupted Lumma in May 2025, sinkholing roughly 394,000 infected Windows hosts and seizing approximately 2,300 command-and-control domains. Lumma rebuilt within weeks. By late 2025 and into 2026, Vidar 2.0 became the most widely used family. Released in October 2025, it is fully rewritten in C with multithreaded exfiltration and bypasses Chrome's AppBound encryption via direct memory injection (per Trend Micro analysis), alongside continued activity from LummaC2, StealC, and ACRStealer. The pattern is clear: takedowns reshape but do not end the market.
Once exfiltrated, stealer logs are typically traded through closed Telegram channels, broker panels, and specialised marketplaces. Russian Market has remained the dominant credential marketplace since 2020, weathering the period in which BreachForums and other forums shut down, were seized, or fragmented into competing successors through 2025 and 2026. The trade is rapid: a corporate credential harvested on Monday can be sold to an initial access broker by Wednesday and abused for ransomware deployment within the week, well before anything resembling a "breach dataset" exists for an automated monitor to scan against.
This is the structural blind spot. Monitoring tools that work primarily from breach databases and paste sites do not see the first 24 to 96 hours after an infection, which is also the period in which the data is most likely to be abused. Several specialist platforms have built capability against this layer, with different focus points. Hudson Rock, an Israeli firm behind the Cavalier platform, concentrates on infostealer infection telemetry and was among the firms that publicly linked infostealer infections in employee or contractor environments to several large 2024 breaches involving Snowflake-hosted data. SpyCloud focuses on large-scale recapture of identity data exfiltrated from infostealer infections and breaches. KELA covers stealer log marketplaces and threat actor communities as part of broader cybercrime intelligence. Constella Intelligence layers infostealer feeds onto identity-centric monitoring. Each platform's effective coverage of any specific log set depends on which operator channels and marketplaces its collection has reached.
For corporate exposure beyond personal accounts, our analysis of corporate credential leak assessment walks through the post-leak workflow in more detail.
Session cookies: the part most users don't realise they're missing
Stealer logs typically contain more than passwords. Modern infostealer families are designed to harvest browser-stored credentials, session cookies, autofill data, and screenshots in a single pass, then ship the archive to a Telegram bot or other command channel. A valid session cookie from an active browser session can let an attacker bypass the password and the multi-factor authentication step entirely, until the session expires or is invalidated server-side. For many web applications, possession of the cookie is operationally equivalent to being signed in as the user. The technique is sometimes called "pass-the-cookie", and a 2026 variant explicitly targeting Microsoft 365 environments was named "Cookie-Bite".
Stealer logs are not the only route. Adversary-in-the-Middle (AiTM) phishing kits proxy the legitimate login flow in real time, capturing both the credential and the issued session cookie before MFA completes. By mid-2025, the Tycoon 2FA phishing-as-a-service platform alone accounted for roughly 62% of the phishing volume Microsoft blocked, with more than 30 million fraudulent emails in a single month. Microsoft reported over 10,000 AiTM attacks per month against its users in 2024. Microsoft, Europol, and partners dismantled the Tycoon 2FA network in early 2026, but successor platforms continue to operate. The practical effect is that session cookies are bled into criminal channels through two parallel routes: infostealer logs from infected devices, and AiTM kits that capture them at sign-in.
The defensive implication is that a password reset alone does not always close the exposure. The session has to be revoked, tokens invalidated, devices signed out. Most consumer-grade monitoring focuses on identifiers and credentials in static breach datasets. It does not inspect live browser sessions, and it cannot tell you which specific session cookies have been stolen and are still valid. A subset of enterprise platforms claim near real-time identification of "hot" session cookies in infostealer-derived data; even there, coverage depends on whether a specific log set has reached the vendor's collection pipeline before the cookie is used. AiTM-captured cookies are typically used immediately by the attacker who captured them and never enter the resale market at all, so monitoring sees nothing.
The most dangerous phase of an account takeover is therefore frequently outside what dark web monitoring can show. The alert that credentials have appeared in a recently recaptured log may arrive weeks after the live cookie was already burned through. Our overview of the stealer log economy covers this layer in more detail.
If a recent alert raises questions you cannot answer from a dashboard, which session was burned, what the attacker did with it, what else is exposed on the same device, that is an investigation, not a monitoring problem.
Talk to an AnalystWhat monitoring does not do: remediation and closure
A common misconception is that monitoring "protects" by closing exposures automatically. It does not. Monitoring is an alerting function: it tells you that an identifier or credential appears in a source the vendor watches, but it does not reset the password, invalidate the token, or remove anything from a criminal archive. Some enterprise tools wire alerts into automated remediation, but that workflow is built by the customer organisation. For consumers, response steps stay manual: change passwords, enable MFA, watch payment cards, dispute fraud if it surfaces. At the corporate level, an alert should trigger a defined incident-handling process, not be treated as the close of a loop.
Vendor landscape: tripwires and SOC-grade intelligence
The market splits roughly into two segments that solve different problems and should not be compared like-for-like. Within each segment, vendors differentiate on coverage, integration, and source mix rather than on whether they "do dark web monitoring."
Consumer-bundled tier
The first segment is consumer-bundled monitoring, found inside identity, credit, antivirus, or password manager products. The dark web component generally focuses on breach data tied to personal identifiers (email addresses, payment cards, sometimes national identity numbers), and alerts come with recommended personal remediation steps. These are tripwire products, appropriate for consumer threat models where the goal is to learn that an old password has surfaced in a credential dump and to act on it.
Identity-and-credit bundles dominate the North American market. Experian combines dark web alerts with credit monitoring for US and UK customers. Norton, which incorporates the legacy LifeLock product, provides identity monitoring inside its antivirus and identity bundles with a large US installed base. IdentityForce and IdentityIQ are credit-bureau-tied US offerings with insurance backing. Bitdefender Digital Identity Protection and Malwarebytes Identity Theft Protection layer monitoring on top of antivirus products. The category is not immune to incidents: Aura disclosed in March 2026 that approximately 900,000 records had been exposed after a vishing attack against an employee account, attributed publicly to ShinyHunters, which is a useful reminder that monitoring vendors are themselves processors holding identifiable data.
Password-manager-integrated alerting is the other consumer angle. 1Password's Watchtower flags credentials that appear in known breaches, and Bitwarden does the same through its breach reports. For European users, Proton Sentinel integrates monitoring with Proton's privacy-positioned account services.
B2B and SOC-grade tier
The second segment is B2B and SOC-grade intelligence, where coverage breadth, recency, and analytical depth vary substantially. These platforms are built for security teams that can act on alerts at scale, integrate findings into SIEM or SOAR pipelines, and tie exposures to other intelligence such as threat actors, campaigns, and vulnerability data.
SpyCloud focuses on large-scale recapture of identity data from infostealer infections and breach datasets, oriented toward enterprise account-takeover prevention. Hudson Rock specialises in infostealer infection telemetry and is known for fast public attribution of infections to specific breaches and corporate environments through its Cavalier platform. KELA covers cybercrime intelligence broadly, with strong visibility into stealer log marketplaces, ransomware leak sites, and threat actor communities. Recorded Future integrates dark web findings into its Intelligence Graph, correlating credential exposures with vulnerability data, threat actor activity, and open-source signals. Flare monitors clear and dark web sources with emphasis on threat actor community and forum visibility. Constella Intelligence layers infostealer feeds onto identity-centric monitoring with a verification focus.
Adversary-focused and infrastructure-focused platforms sit alongside the above. Intel 471 builds intelligence around underground actors and the marketplaces they operate in, and since acquiring SpiderFoot in 2022 also offers SpiderFoot HX as a hosted OSINT automation platform that complements its TITAN cyber threat intelligence product. Cybersixgill and DarkOwl emphasise automated collection from dark web sources at scale and provide data lakes that other tools query. ZeroFox addresses external attack surface and digital risk protection extending beyond credentials into impersonation, brand abuse, and exposed assets.
Adjacent to the dedicated dark web monitoring vendors are the broader threat intelligence and incident response teams whose research feeds the wider picture: Mandiant (Google Cloud), Unit 42 (Palo Alto Networks), CrowdStrike Intelligence, Microsoft Threat Intelligence, IBM X-Force, and Cisco Talos. These teams do not sell dark web monitoring as a discrete product, but their reporting on infostealer families, ransomware groups, and credential-leak campaigns is part of the source layer that monitoring vendors and analysts read against.
What B2B platforms have in common, and what consumer bundles do not, is meaningful coverage of infostealer-derived data and the operational expectation that someone is reading the alerts. Without that, the data is noise.
Free and community resources
Some of the most useful resources in this space are free and community-maintained. They will not replace a paid monitoring service for someone who wants automated alerting, but they offer a baseline check, a wider view of what is publicly indexable, and a window into the methods used by professional analysts.
Have I Been Pwned, operated by Troy Hunt, is the long-running free service for checking whether an email address or phone number appears in published breach datasets. Many commercial monitoring tools draw on its public dataset under licence. Mozilla Monitor offers a free Firefox-integrated breach check built on top of HIBP data; the paid Monitor Plus tier was discontinued in December 2025 after the underlying data-removal partnership ended.
For practitioner-grade dark web research, the International Anti Crime Academy's IACA Dark Web Investigation Support is a Netherlands-based, query-private tool collection that has been maintained since 2013, oriented toward law enforcement and OSINT researchers. The OSINT Framework, maintained by Justin Nordine, is the standard curated tree of free OSINT tools, with a dedicated branch for dark web sources. The OSINT Team, a community publication, regularly catalogues free dark web OSINT tools and publishes investigator write-ups. The community-curated awesome-osint list on GitHub indexes hundreds of free tools including dark web–specific resources, and the open-source SpiderFoot project (now developed within Intel 471) continues to ship as a free OSINT automation tool that includes dark web modules.
For analysts and researchers, the open-source MISP threat intelligence platform is widely used to share and correlate indicators including dark web findings. None of these tools generate the consumer alerts that a bundled product does, but they are the substrate on which most of the paid services build, and any practitioner working in this space should know them by name.
Regulatory considerations when you sign up
Dark web monitoring services process personal data to identify exposures. The questions to ask a vendor are similar across jurisdictions (which identifiers are submitted, where they are stored, how long they are retained, who else they may be shared with) but the regulatory backdrop differs in ways that affect the contract you sign and the rights you can rely on if something goes wrong.
For EU and UK users, the GDPR (and the UK GDPR retained domestically post-Brexit) requires the vendor to hold a lawful basis for processing, which is usually consent for consumer products or legitimate interests for business products. The vendor must comply with purpose limitation and data minimisation, hold identifiers only for the time strictly necessary, document retention windows, and disclose processing in privacy notices. The European Data Protection Board has reiterated these obligations through guidance and enforcement decisions. International transfers, for example to a US-based monitoring vendor, require an adequate transfer mechanism such as standard contractual clauses and a transfer impact assessment. For business buyers, the vendor acts as a processor under a data processing agreement, and the monitoring should appear in records of processing activities with the lawful basis documented and proportionate to the security objective.
For US users, the regulatory landscape is more fragmented. There is no federal equivalent to the GDPR. Instead, state privacy laws define rights to access, deletion, and opt-out of data sale or sharing. The California Consumer Privacy Act (CCPA), expanded by the California Privacy Rights Act (CPRA), is the most developed; equivalent statutes are in force or coming online in Virginia, Colorado, Connecticut, Utah, Texas, Oregon, Montana, Iowa, Tennessee, and a growing list of other states. Sector-specific laws cover financial data (Gramm-Leach-Bliley) and health data (HIPAA), but neither typically applies to a consumer monitoring service. The practical implication is that the contract you sign with the vendor is the primary control rather than a uniform statutory regime, and the questions to ask are the same: which identifiers are submitted, where they are stored, how long they are retained, and whether the vendor sells or shares any of your data under the CCPA's definitions.
For Canadian users, the federal Personal Information Protection and Electronic Documents Act (PIPEDA) governs commercial data processing, with provincial equivalents in Alberta and British Columbia. Quebec's Law 25, in force since September 2023, introduces stronger consent and transparency obligations that align closely with GDPR principles, including breach notification thresholds, automated decision-making rules, and explicit data residency considerations for transfers outside the province. A Canadian buyer should expect the vendor to disclose where identifiers are stored, particularly if processing happens in the US, and to provide a clear retention policy. Bill C-27, currently progressing through Parliament, would replace PIPEDA with a more GDPR-aligned statute if enacted.
This is rarely the headline question for a buyer, but it is the question that surfaces in a regulator audit, a class action, or a contractual dispute if anything goes wrong.
When monitoring is enough, and when it is not
For most individuals with reasonable password hygiene, MFA on important accounts, and no specific reason to believe they are being targeted, bundled monitoring inside an identity or password product is a reasonable signal. It will tell you when an identifier you use has appeared in a public breach dump, which is useful and which most people would not otherwise check. The marginal cost is low, the cognitive load is low, and the action it prompts (change a reused password, enable MFA where it is not already on) is right.
A standalone consumer subscription becomes worth considering for higher-exposure profiles: public figures, executives, journalists, people in legal or medical roles, anyone whose name and identifiers attract opportunistic targeting. The marginal value over a bundle is broader identifier coverage (phone numbers, ID documents), more frequent scans, and inclusion of some infostealer-derived data where the provider has access. Not all paid services include the infostealer layer; the question to ask before subscribing is which sources are covered, not how often the dashboard updates.
Monitoring stops being sufficient when there is evidence of a targeted compromise: unexplained sign-ins, MFA prompts that do not match your activity, transactions you did not make, account recovery emails that arrive without your action, or a credible suspicion that an infostealer has run on a personal device. At that point the problem is no longer "are my credentials in a list somewhere" but "what specifically is happening to my accounts and where is it happening from." That is a question for an investigation, not a dashboard.
The same logic applies at the corporate level. Monitoring is one sensor. It is valuable for catching reused corporate credentials, third-party breaches involving your domains, and infostealer-derived exposures within your vendor's coverage. It does not replace endpoint detection, identity security, incident response, or the human work of reading the signal in context. When alerts intersect with privileged accounts, named threat actors, or specific compromise indicators, the next step is an investigation that ties dark web data, endpoint evidence, and access logs together.
The honest ceiling
The structural ceiling on dark web monitoring is that it is bounded by what its sources have already collected. Anything that has not been packaged into a dataset the vendor can recapture is, by definition, not in the alert pipeline. That includes most of the live trade in infostealer logs, most session cookies during their valid window, and most one-to-one resale of high-value credentials. For the everyday case (an old breach surfacing, a reused password being detected) the technology does what it says. For the exceptional case (a targeted compromise, a live session in flight, a private resale) it cannot.
Knowing which case you are in is the actual question to answer before subscribing, renewing, or deciding to do nothing.
If a recent alert, breach notification, or unexplained account activity is raising questions a dashboard cannot answer, our Lockdown investigation traces credential and infostealer exposure across breach data, stealer logs, and open sources, and identifies the specific remediation steps that monitoring alone cannot deliver. Talk to an analyst.
Frequently Asked Questions
What is dark web monitoring?
Dark web monitoring is a service that compares your identifiers, usually email addresses, domains, phone numbers, or payment card numbers, against data collected from public data breaches, paste sites, and a selected set of criminal forums and marketplaces. When a match is found, the service generates an alert with the source, the data type exposed, and a recommended response. Some enterprise platforms integrate alerts into security workflows so teams can enforce password resets or open incidents automatically.
Is dark web monitoring worth paying for?
For consumers with reasonable password hygiene and multi-factor authentication, bundled monitoring inside an identity, credit, or password product is a reasonable tripwire and the marginal cost is low. A standalone subscription becomes worth considering for higher-exposure profiles where broader identifier coverage and infostealer-derived data are useful. Monitoring stops being sufficient when there is evidence of a targeted compromise or an active session takeover, where an investigation is the appropriate next step.
Is dark web monitoring safe to use?
Reputable dark web monitoring services are generally safe, provided they explain how they process and protect your data. In the EU and UK, providers must hold a lawful basis under the GDPR. In the US, the contract and the applicable state privacy law (CCPA/CPRA and equivalents) define what the vendor can and cannot do with your data. In Canada, PIPEDA federally and Quebec's Law 25 set the baseline. Before subscribing, check which identifiers you are submitting, where the vendor stores and processes them, how long both identifiers and matched breach data are retained, and whether the vendor sells or shares your data with third parties.
Do I need dark web monitoring if I already use a password manager?
A password manager with unique passwords and built-in breach alerts (such as Have I Been Pwned integration) covers much of the same territory as basic dark web monitoring. It will warn you when stored passwords appear in known breaches or when you reuse credentials. Dedicated monitoring adds value when you want to track non-credential identifiers (phone numbers, ID documents) or want exposure to infostealer-derived data where the provider has it. If your password hygiene and MFA are strong, a separate subscription is complementary rather than essential.
What is a good alternative to Google's dark web report?
After Google's Dark Web Report shut down in February 2026, users lost a free, integrated way to see certain dark web exposures attached to a Google account. Substitutes include bundled monitoring inside identity or credit products, standalone consumer subscriptions, and password managers with breach-alert features. For people who need broader visibility into stealer logs, infostealer infections, or specific session-cookie exposure, a one-shot human-led investigation provides a more complete view than any automated dashboard.
Can dark web monitoring remove my data from the dark web?
No. Monitoring services are alerting tools. They tell you that data has appeared in a source the vendor watches; they do not, by default, take action to remove anything. Once data has been published in a breach dataset, paste, or criminal channel, it cannot be reliably recalled. The realistic response is to invalidate what is exposed (reset passwords, revoke sessions, replace cards), reduce what is collectable in the first place (data broker removal, opt-outs, footprint reduction), and monitor for downstream abuse.
Sources
This article is built primarily from regulatory and threat-intelligence sources, with vendor product pages cited only as factual descriptions of each vendor's own offering. Where the official source for a load-bearing claim is gated or not directly linkable, reputable secondary reporting is cited that confirms the same facts.
Threat landscape and infostealer activity:
- ENISA, Threat Landscape 2025 (October 2025) — primary source for the 87.3% combined intrusion share, Lumma family prevalence post-Operation Magnus, and the 350% increase in Lumma activity.
- US Department of Justice, Operation Magnus public communications (October 2024) — RedLine and META infostealer takedown.
- Microsoft, Disrupting Lumma Stealer (May 2025) — sinkholing of approximately 394,000 hosts and seizure of approximately 2,300 C2 domains.
- Trend Micro Research, Vidar Stealer 2.0 (October 2025) — architectural rewrite, multithreaded exfiltration, AppBound encryption bypass.
- Microsoft Threat Intelligence on Adversary-in-the-Middle phishing — 10,000+ AiTM attacks per month figure (2024) and Tycoon 2FA dismantling context.
Google Dark Web Report shutdown:
- 9to5Google, Google is shutting down its Dark Web Report tool (15 December 2025).
- TechCrunch, Google's Dark Web Report feature will no longer be available starting in February (15 December 2025).
- The Hacker News, Google to Shut Down Dark Web Monitoring Tool (15 December 2025).
Vendor disclosures and acquisitions:
- Aura, Security Incident Update (March 2026) — disclosure of the vishing-led incident exposing approximately 900,000 records, attributed by the actor to ShinyHunters.
- Krebs on Security, Mozilla Drops Onerep After CEO Admits to Running People-Search Networks (21 March 2024).
- Krebs on Security, Mozilla Says It's Finally Done With Two-Faced Onerep (22 November 2025) — Monitor Plus discontinuation.
- Intel 471, Intel 471 Acquires SpiderFoot (2 November 2022).
Regulatory:
- European Data Protection Board — guidance on processor obligations, lawful basis, and data minimisation under the GDPR.
- California Privacy Protection Agency — CCPA / CPRA framework.
- Office of the Privacy Commissioner of Canada — PIPEDA federal framework.
- Commission d'accès à l'information du Québec — Law 25, in force 22 September 2023.
Free and community resources cited in the article:
- IACA Dark Web Investigation Support (International Anti Crime Academy, Netherlands).
- OSINT Framework by Justin Nordine.
- The OSINT Team publication.
- awesome-osint on GitHub.
- MISP open-source threat intelligence platform.
- SpiderFoot open-source OSINT automation (Intel 471).
Vendor product pages (cited factually for each vendor's own stated coverage): Hudson Rock, SpyCloud, KELA, Recorded Future, Flare, Constella Intelligence, Intel 471, Cybersixgill, DarkOwl, ZeroFox, Mandiant, Unit 42, CrowdStrike Intelligence, Microsoft Threat Intelligence, IBM X-Force, Cisco Talos, Experian, Norton/LifeLock, IdentityForce, IdentityIQ, Bitdefender, Malwarebytes, 1Password, Bitwarden, Proton Sentinel, Mozilla Monitor, Have I Been Pwned.