OSINT Assessment
Before an attacker targets your organisation, they build a complete picture of your exposure: leaked credentials on dark web forums, sensitive code on public repositories, and employee data that makes spear-phishing trivial. Our OSINT assessment finds exactly what they find, then tells you how to remove it from the picture.
Dark Web Monitoring &
Digital Footprint Analysis
Manual OSINT investigation goes further than automated dark web monitoring tools. We search private Telegram channels, emerging criminal forums, and public code repositories, correlating findings across sources to build attack scenarios your board can act on. Every assessment applies the MITRE ATT&CK Reconnaissance phase (TA0043) as our operational framework.
Dark Web Intelligence
Our analysts access the closed-access underground forums, ransomware leak sites, initial access broker (IAB) listings, and Telegram threat actor channels where your data actually circulates. We cover credential dumps, stealer log repositories from Redline, Raccoon, and Vidar malware, and underground marketplaces that automated dark web monitoring services routinely miss.
Digital Footprint Assessment
A complete digital footprint assessment using certificate transparency log analysis, passive DNS enumeration, and WHOIS records. We identify forgotten subdomains, orphaned campaign microsites, decommissioned marketing sites, and shadow IT assets that your internal CMDB does not record. Attackers target assets you have forgotten about. We find them first.
Employee Exposure Profiling
Identifying key personnel and their exposure across LinkedIn, GitHub, and technical forums to assess social engineering and spear-phishing risk. We assess whether technical staff are inadvertently revealing your technology stack, internal tooling, or network architecture in public profiles and job postings.
Code Repository Analysis
Scanning public code repositories (GitHub, GitLab, Bitbucket) for accidentally committed API keys, hardcoded secrets, internal IP addresses, and proprietary source code. Code repositories are one of the most consistently productive OSINT sources in our assessments.
Credential Breach Correlation
Scanning breach databases, deep web forums, and paste sites for leaked corporate credentials. We identify compromised email and password pairs from combolists and stealer log dumps, correlate findings against your employee directory and privileged accounts, and build attack scenarios showing how those credentials could be used for initial access.
Passive Cyber Reconnaissance
Passive reconnaissance using Shodan, Censys, SpiderFoot, theHarvester, and Maltego. We gather deep intelligence without sending a single packet to your infrastructure. Completely undetectable by your SOC or firewalls. This phase applies MITRE ATT&CK TA0043 Reconnaissance as our operational framework.
Your External Exposure, Documented
OSINT assessment findings satisfy ISO 27001 Annex A.5, NIST CSF Identify function, and GDPR Article 32 obligations, giving your risk register the evidence it needs.
Credential Sale Window
Stolen credentials are typically listed for sale within 72 hours of a breach. Without active dark web monitoring, the first sign is the breach itself.
Credential-Based Breaches
Of data breaches involve compromised credentials. OSINT identifies exactly which of your credentials are exposed before attackers use them.
Intelligence Categories
Dark web, digital footprint, employee exposure, code repositories, and passive reconnaissance. Every source an attacker uses, checked by our analysts.
Controls
Engagement Workflow
Structured to minimise operational friction and maximise the value of the testing window.
Scoping & Requirements
You provide domains, brands, subsidiary names, and key executive names. We confirm what is in scope and excluded. Common triggers: breach notification, upcoming penetration test, M&A due diligence, or regulatory requirement under NIS2, DORA, or the UK Cyber Security Resilience Bill.
Data Gathering
Automated tooling (Shodan, Censys, SpiderFoot, Maltego) combined with manual investigation. Surface, deep, and dark web sources queried in parallel across breach databases, dark web forums, stealer log repositories, code repositories, and social media profiles.
Analysis & Verification
Raw intelligence analysed to remove false positives. Credential findings verified for currency and confirmed as relating to your organisation. Every finding validated by a CREST-accredited analyst before inclusion in the final report.
Intelligence Report
A structured report with risk-rated findings, attack scenario narratives showing how findings combine into breach paths, and a prioritised remediation roadmap. Results typically delivered within 5 to 10 business days for standard scope.
What You Receive
Every OSINT assessment produces a structured intelligence report formatted for both security teams and board-level stakeholders.
Reports delivered via encrypted portal. Executive summary designed for direct board submission. Technical findings formatted for risk register integration.
When Do Organisations Commission OSINT?
An OSINT assessment is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.
Breach Notification Received
Credentials from your domain appeared in a breach alert. You need to know: how bad is it? and what else is out there?
Pre-Penetration Test Reconnaissance
Running OSINT before an external penetration test tightens scope and surfaces forgotten assets. Most external pen test findings in credentials are OSINT findings, not vulnerabilities.
M&A Due Diligence
Your acquiring or acquired company needs a digital footprint assessment. Unknown assets, leaked credentials, and dark web exposure are material risks during integration.
Compliance Audit Gap
Your auditor flagged threat intelligence or attack surface awareness as a control gap under ISO 27001, NIS2, DORA, or the UK Cyber Security Resilience Bill.
Board Directive
The board or CISO has mandated demonstrable attack surface awareness. You need a structured intelligence report, not a dashboard nobody checks.
Third-Party Breach Response
A supplier or SaaS provider has been breached. You need to assess whether your credentials, data, or infrastructure were affected before the exposure window closes.
Fixed-Price Engagements
All tiers include dark web monitoring, credential exposure analysis, digital footprint mapping, and a structured intelligence report with attack scenario narratives.
Standard
Single domain, dark web + credential exposure
Comprehensive
Multiple domains, code repos, employee exposure
Enterprise
Multi-brand, M&A scope, executive exposure
Turn OSINT Findings into
Active Threat Response.
OSINT reveals what attackers can see. The next step is validating whether those attack paths are exploitable, then monitoring for active exploitation of discovered credentials and exposed infrastructure.
Explore Next StepsExternal Network Pentest
Validate whether the attack paths your OSINT report identifies are actually exploitable.
Attack Surface Management
Continuous monitoring of your external perimeter. OSINT is the baseline; ASM keeps it current.
Managed Detection & Response
24/7 monitoring tuned to the credential abuse and phishing campaigns your OSINT report identifies.
Red Team Operations
OSINT is the reconnaissance phase. Red team validates whether findings lead to full breach simulation.
Full Penetration Testing Catalogue
Comprehensive penetration testing services tailored to your environment.
Internal Testing
Post-perimeter assessments targeting Active Directory, lateral movement, privilege escalation, and segmentation validation from inside your network.
The best time to test your defences is now.
Join the high-growth companies relying on Precursor for continuous offensive and defensive security.
Frequently Asked Questions
Common questions about this service, methodologies, and deliverables.
An OSINT (Open Source Intelligence) assessment is a structured, passive security exercise that maps your organisation's exposure across the surface, deep, and dark web. Conducted by UK-based CREST-accredited analysts, it identifies leaked credentials, dark web monitoring targets, shadow IT assets, and publicly exposed technical details that attackers use during the passive reconnaissance phase of a breach. Unlike a penetration test, no active exploitation is performed. The assessment applies MITRE ATT&CK Reconnaissance techniques (TA0043) as its operational framework.
Dark web monitoring is the process of searching criminal forums, dark web marketplaces, paste sites, and Telegram channels for your organisation's compromised data, including leaked employee credentials, internal documents, and breach database entries. Businesses need dark web monitoring services because attackers actively buy and sell stolen credentials before using them to access corporate systems. A manual OSINT assessment goes further than automated dark web monitoring tools: we identify which credentials are actively being traded, correlate findings with your employee directory and admin accounts, and build an attack scenario showing how those credentials could be used to breach your environment. We provide UK dark web monitoring as part of every OSINT assessment from £3,000.
OSINT assessment pricing typically ranges from £3,000 to £10,000 depending on scope and complexity. Standard OSINT for a single domain (dark web monitoring, credential exposure, digital footprint) averages £3,000 to £5,000. Comprehensive assessments covering multiple domains, code repository analysis, and executive exposure profiling typically cost £5,000 to £8,000. Enterprise-scope OSINT for multi-brand organisations, M&A due diligence, or regulatory compliance requirements typically costs £8,000 to £10,000 or more. All engagements are fixed-price with no hidden charges. We provide a formal quote after understanding your scope requirements.
Dark web monitoring is one component of an OSINT assessment, and typically the most commercially valuable one. An automated dark web monitoring service continuously scans a fixed set of indexed sources for your email domains and sends alerts when credentials appear. An OSINT assessment is broader: it covers dark web monitoring, digital footprint analysis, employee exposure profiling, code repository scanning, and passive reconnaissance, all performed manually by experienced analysts who correlate findings into attack scenarios. The key difference is depth and context. A dark web monitoring alert tells you a credential was found. An OSINT assessment tells you which credential, who it belongs to, what systems they have access to, and how an attacker would use it to breach your environment.
Finding leaked credentials is a trigger event that requires immediate action. First: scope the exposure before acting. Our OSINT assessment investigates the full extent of the leak, identifying which credentials are confirmed compromised, whether they are being actively traded, and whether any other data (documents, code, personal data) was included in the same breach. Second: we provide a prioritised remediation plan that sequences password resets, account lockdowns, and dark web scan follow-up actions correctly. We can begin an urgent OSINT investigation within 48 hours of engagement.
Yes, particularly for organisations with a significant number of remote workers, SaaS dependencies, or a history of third-party data breaches. Credentials stolen in a breach are typically listed for sale within 72 hours. Without active dark web monitoring, the first indication that your credentials are compromised is often the breach itself. An OSINT assessment providing a one-time dark web intelligence snapshot is also valuable as a baseline before deploying continuous monitoring tooling, ensuring you understand your current exposure before investing in ongoing coverage.
Attack surface management (ASM) platforms continuously scan your known and discoverable external assets using automated tooling. OSINT assessments are expert-led, one-time (or periodic) exercises that go further: our analysts access human-curated underground sources, closed-access forums, and dark web marketplaces that automated tools cannot index. An OSINT assessment is also typically the recommended baseline before deploying an ASM platform, since it identifies the unknown assets the platform needs to be configured to monitor. For continuous monitoring, see our managed Attack Surface Management service.
A penetration test involves actively probing and attempting to exploit your systems. An OSINT assessment is entirely passive: we look at your organisation from the outside using only public sources, without touching your infrastructure. Most external penetration tests include a brief OSINT phase. A dedicated OSINT assessment goes significantly deeper, spending the full engagement on reconnaissance rather than treating it as a preliminary step. The two services are complementary: OSINT runs first to tighten pen test scope and surface forgotten assets.
Yes. OSINT relies entirely on publicly accessible information and open-source data sources. We do not access systems without authorisation or break any laws to obtain data. The assessment is passive reconnaissance: we find what is already visible, often in locations you were not aware to look. All work is conducted under a signed engagement agreement defining the precise scope.
Our findings typically fall into five categories: (1) Compromised credentials, including employee email and password pairs from breach databases, combolists, and stealer logs; (2) Dark web intelligence, including data for sale, IAB listings, and ransomware operator communications mentioning your organisation; (3) Shadow IT and forgotten assets, including orphaned subdomains, unapproved cloud instances, and infrastructure from past M&A activity; (4) Code repository leakage, including API keys, hardcoded secrets, and internal architecture details committed to public repositories; (5) Employee exposure, including social engineering-ready intelligence gathered from LinkedIn, technical forums, and public profiles.
We cannot directly delete data from the internet. Our report provides specific guidance on how to issue takedown requests, invalidate leaked credentials, remove sensitive information from code repositories, and configure systems to stop leaking information in future. For active credential exposures, we provide immediate remediation steps to close the risk before attackers exploit the findings.
Standard-scope OSINT assessments are typically delivered within 5 to 10 business days from engagement start. Urgent engagements triggered by breach notifications or active credential exposure can be scoped and started within 48 hours. Enterprise-scope assessments covering multiple brands, subsidiaries, or M&A targets may take 10 to 15 business days depending on the breadth of investigation required.



