Open Source Intelligence Risk Assessment

Open Source Intelligence refers to the amazing amount of information that’s out there on people and organisations - everything from the CEO’s email address to the version of Microsoft 365 they use can be used to create a phishing attack or exploit a vulnerability.

What is Open Source Intelligence?

Open Source Intelligence refers to both the information that is openly available on individuals and organisations and the process for researching and collecting it. OSINT typically refers to publicly available information that doesn’t require specialist skills or tools to access.

In the context of cyber security, OSINT most often refers to combining such information to facilitate cyber attacks, such as phishing and ransomware.

What is Open Source Intelligence?

Open Source Intelligence refers to both the information that is openly available on individuals and organisations and the process for researching and collecting it. OSINT typically refers to publicly available information that doesn’t require specialist skills or tools to access.

In the context of cyber security, OSINT most often refers to combining such information to facilitate cyber attacks, such as phishing and ransomware.

Casing the joint has never been easier

Criminals have always ‘cased’ or researched their targets, but modern search tools and the depth of information available online today makes their job much easier - or perhaps more difficult, if you consider the sheer volume of information they may have to trawl through.

Sources of OSINT include the obvious:

Some of the less obvious sources are equally available with only a little knowledge:

So, is my data protected?

In today's digital landscape, data privacy is a critical concern governed by laws like GDPR. Privacy agreements, often accepted without thorough reading, apply to our online presence. Despite these measures, real criminals bypass such constraints. Automated scraping tools quickly extract vast information, while AI-powered tools identify valuable correlations.

Many unintentionally breach copyright laws online. However, true threats lie beyond checkboxes. Cybercriminals leverage technology to exploit vulnerabilities, emphasizing the need for robust cybersecurity strategies beyond conventional privacy agreements and legal frameworks.

Actionable Intelligence Approach

Given the sheer volume of data that could be collected in an OSINT exercise, the critical thing is to focus on actionable intelligence - the material that might be used against you and may create a threat. We treat OSINT similar to a vulnerability scan where we triage and prioritise threat information. In a typical assessment we might:

What do we cover?

There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.

The following is a far from exhaustive list of areas for investigation:

Technical
Infrastructure
Business
Social and Personal

Benefits of an OSINT Risk Assessment

Explore the advantages of having an OSINT Risk Assessment, ensuring a proactive and robust defence against evolving cyber threats in today's dynamic digital landscape.

Casing the joint has never been easier

Criminals have always ‘cased’ or researched their targets, but modern search tools and the depth of information available online today makes their job much easier - or perhaps more difficult, if you consider the sheer volume of information they may have to trawl through.

Sources of OSINT include the obvious:

  • your company website often provides detailed org charts and departmental processes as well as annual statements which contain a wealth of information.
  • your personal Linkedin professional profile gives links to all your colleagues, often with reporting lines and team members, as well as regular business contacts.
  • your Facebook page provides useful personal details such as names of pets and children.
  • published articles, blogs, case studies and such often provide information about an organisation’s IT infrastructure, supply-chain and plans.

Some of the less obvious sources are equally available with only a little knowledge:

  • Scouring the internet for leaked or accidentally published documents containing personal, confidential or financial information.
  • Using publicly available tools such as “HaveIBeenPwned” and GHunt to delve into email information.
  • Using standard browsers to find details of website platforms and versions, IP addresses and therefore locations.
  • Using location data and other details attached to photos posted online.
  • Specialised journals, magazines, newsletters, conferences and events.
  • and many many more…

Why conduct an OSINT Risk Assessment?

An OSINT Risk Assessment is really an extension to your standard business risk assessments. We follow the same paths that a genuine cyber criminal - or threat actor - might take when researching your company.

In the same way that we might perform a vulnerability scan or penetration test on your systems and software, an OSINT assessment looks for vulnerabilities caused by information that has been exposed to public access.

So, is my data protected?

In today's digital landscape, data privacy is a critical concern governed by laws like GDPR. Privacy agreements, often accepted without thorough reading, apply to our online presence. Despite these measures, real criminals bypass such constraints. Automated scraping tools quickly extract vast information, while AI-powered tools identify valuable correlations.

Many unintentionally breach copyright laws online. However, true threats lie beyond checkboxes. Cybercriminals leverage technology to exploit vulnerabilities, emphasising the need for robust cybersecurity strategies beyond conventional privacy agreements and legal frameworks.

Actionable Intelligence Approach

Given the sheer volume of data that could be collected in an OSINT exercise, the critical thing is to focus on actionable intelligence - the material that might be used against you and may create a threat. We treat OSINT similar to a vulnerability scan where we triage and prioritise threat information. In a typical assessment we might:

  • create an overview of the public face of your organisation
  • detail key figures and roles that might be at threat
  • follow the critical threats through as on a Red Team exercise
  • provide detailed feedback and triaged, prioritised results.

What do we cover?

There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.

The following is a far from exhaustive list of areas for investigation:

Technical
  • URLs and domain/sub-domain information
  • Old or unused but still available domains
  • Similar or misspelled URLs (used for phishing)
  • Metadata leakages (used for vulnerabilities)
Infrastructure
  • Email structures and formats (for access)
  • Published emails (for phishing)
  • Breach data (for account take over)
  • IP addresses (for location information)
  • Security access card formats (for physical entry)
Business
  • Public financial records
  • News and press releases
  • Key employee profiles and contacts
  • Documents, papers, articles (published and leaked)
Social and Personal
  • Social media accounts for the organisation
  • Social information for key individuals (for security credentials like Date of Birth)
  • Family member posts and photographs
  • Twitter, Linkedin and other message platforms

Benefits of an OSINT Risk Assessment

Explore the advantages of having anOSINT Risk Assessment, ensuring a proactive and robust defence against evolving cyber threats in today's dynamic digital landscape.

Why choose us?

Choose Precursor Security for penetration testing excellence—where industry-leading expertise, CREST accreditation, and a client-focused approach converge to fortify your digital defences with precision and reliability.

Frequently Asked Questions

We don't leave any stone unturned – here are answers to our frequently asked questions about OSINT Risk Assessments...

Why do I need an OSINT Risk Assessment?

Organisations need to keep track of the information that is out there on their business. However, the majority of that information is benign and, indeed, organisations want it to be found and read to generate new business.

A Risk Assessment finds the needles in haystacks - the inadvertent leaks and the unintended exposure of information that can be used by criminals to target your organisation. A Risk Assessment from Precursor will prioritise those issues that need urgent or eventual resolution.

What will I receive after the assessment has been completed?

The deliverable from any assessment is a complete report, detailing and contextualising each identified vulnerability against your business and relaying the risks that each issue poses to your systems, services and staff.

The report provides a complete description of what each identified issue is, specific remediation advice on how to address the issue, and detailed evidence, wherever necessary to verify the issues impact.

How could OSINT negatively impact my business?

Improper handling of OSINT introduces potential negative impacts to your business. From reputational risks due to misunderstood information to security vulnerabilities through public data exploitation, there's a danger of competitive disadvantage based on misinterpretations and legal repercussions arising from non-compliance with privacy standards.

What sources of information should be assessed?

There are many potential sources of information, both in the public domain and on the Dark Web and other slightly less public areas. As part of our initial scoping discussion we will agree with you what areas need focus and which might be prioritised at a lower level for longer term investigation.

See how we can help your business with an OSINT Risk Assessment..

Get in touch with us for a free consultation or quote.

Check - Elements Webflow Library - BRIX Templates
Thank you for your message, we will be in touch.
Oops! Something went wrong while submitting the form.